2018
DOI: 10.1007/978-3-319-93563-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…CICIDS2017 is one of the unique datasets that includes up-to-date attacks. Furthermore, the features are exclusive and matchless in comparison with other datasets such as UNSW-NB15 [30,31], AWID [32], GPRS [33], and CIDD-001 [34]. For this reason, CICIDS2017 was selected as the most comprehensive IDS benchmark to test and validate the proposed ideas.…”
Section: Cicids2017 Datasetmentioning
confidence: 99%
“…CICIDS2017 is one of the unique datasets that includes up-to-date attacks. Furthermore, the features are exclusive and matchless in comparison with other datasets such as UNSW-NB15 [30,31], AWID [32], GPRS [33], and CIDD-001 [34]. For this reason, CICIDS2017 was selected as the most comprehensive IDS benchmark to test and validate the proposed ideas.…”
Section: Cicids2017 Datasetmentioning
confidence: 99%
“…ANN) showed high detection accuracy, confirming the potential applications of deep algorithms in securing Wi-Fi networks from impersonation attacks. A similar study [235] used a combination of two unsupervised algorithms (SAE) for mining features and k-means clustering for categorising the input into two classes: benign and malicious.…”
Section: B Network Layermentioning
confidence: 99%
“…These attacks forge activities to take advantage of others, disguising a malicious device as a legitimate device in a WiFi network. Using the Aegean WiFi Intrusion Dataset (AWID) [156], a comprehensive WiFi network benchmark dataset, Aminanto and Kim [157] trained an unsupervised stacked autoencoder with two hidden layers as a feature extractor, which is fed into a k-means clustering algorithm with two centroids. This method proved to be accurate at detecting these impersonation attacks with a detection rate of 92.18%, false alarm rate of 4.40%, and precision of 86.15%.…”
Section: Network Intrusion Detectionmentioning
confidence: 99%