2022
DOI: 10.1016/j.mlwa.2022.100389
|View full text |Cite
|
Sign up to set email alerts
|

A single supervised learning model to detect fake access points, frequency sweeping jamming and deauthentication attacks in IEEE 802.11 networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
1
0
Order By: Relevance
“…The approach of using an external device was due to the fact that they believed it was not a function the WAP could execute, a misconception our work has proven. Amoordon et al then extended their IDS method [ 57 ] by evaluating seven ML algorithms to determine whether the RSSI values of the beacon frames could provide additional accuracy. They argued that no single approach could detect rogue access points, jamming, and deauthentication attacks simultaneously and that their IDS could perform this, which is an assertion this work also disproves.…”
Section: Discussionmentioning
confidence: 99%
“…The approach of using an external device was due to the fact that they believed it was not a function the WAP could execute, a misconception our work has proven. Amoordon et al then extended their IDS method [ 57 ] by evaluating seven ML algorithms to determine whether the RSSI values of the beacon frames could provide additional accuracy. They argued that no single approach could detect rogue access points, jamming, and deauthentication attacks simultaneously and that their IDS could perform this, which is an assertion this work also disproves.…”
Section: Discussionmentioning
confidence: 99%
“…If one of them wants to issue a Deauthentication, it includes the hash in the Deauthentication to confirm its identity. The research [26] makes use of Supervised Learning to detect deauthentication attacks. The model collects the network traffic and focuses on three indicators: Frame Interval, Received Signal Strength Indicator (RSSI), and Sequence Number.…”
Section: Ieee 80211 Attacks Countermeasuresmentioning
confidence: 99%