Investigating Cross-Platform Robustness for Machine Learning Based IDSs on 802.11 Networks
نویسندگان
چکیده
Security and Intrusion detection in 802.11 networks is currently an active area of research where WiFi specific Data Link layer attacks are an area of focus. While these attacks are very simple in implementation, their effect on WiFi networks can be devastating. Recent research has focused on producing machine learning based IDSs for these attacks. Such IDSs have shown promise. Our work investigates the CrossPlatform robustness of such machine learning based solutions. By cross-platform robustness we mean the ability to train a solution on one network and run it seamlessly on another. We demonstrate that machine learning based IDSs could potentially suffer when employed across different platforms. In order to solve this, we propose a MAC address mapping technique which can achieve a Cross-Platform detection rate, for machine learning based IDSs, on average of 100% and a false positive rate on average of 0.1%.
منابع مشابه
Robust learning intrusion detection for attacks on wireless networks
We address the problem of evaluating the robustness of machine learning based detectors for deployment in real life networks. To this end, we employ Genetic Programming for evolving classifiers and Artificial Neural Networks as our machine learning paradigms under three different Denial-of-Service attacks at the Data Link layer (De-authentication, Authentication and Association attacks). We inv...
متن کاملInvestigating the performance of machine learning-based methods in classroom reverberation time estimation using neural networks (Research Article)
Classrooms, as one of the most important educational environments, play a major role in the learning and academic progress of students. reverberation time, as one of the most important acoustic parameters inside rooms, has a significant effect on sound quality. The inefficiency of classical formulas such as Sabin, caused this article to examine the use of machine learning methods as an alternat...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملForward kinematic analysis of planar parallel robots using a neural network-based approach optimized by machine learning
The forward kinematic problem of parallel robots is always considered as a challenge in the field of parallel robots due to the obtained nonlinear system of equations. In this paper, the forward kinematic problem of planar parallel robots in their workspace is investigated using a neural network based approach. In order to increase the accuracy of this method, the workspace of the parallel robo...
متن کاملIRHM: Inclusive Review Helpfulness Model for Review Helpfulness Prediction in E-commerce Platform
Online reviews have become essential aspect in E-commerce platforms due to its role for assisting customers’ buying choices. Furthermore, the most helpful reviews that have some attributes are support customers buying decision; therefore, there is needs for investigating what are the attributes that increase the Review Helpfulness (RH). This research paper proposed novel model called inclusive ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007