Skip to main content

An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

The majority existing wireless intrusion detection systems identifies intrusive behaviors are based on the exploration of known vulnerabilities called signatures of attacks. With this mechanism, only known vulnerabilities are detected which leads to bringing the necessity of new techniques to add in the system. This work considers an architecture for intrusion detection in wireless network based on anomaly. The system is capable to adapt itself to a profile of a new community of users, as well as recognizing attackswith different characteristics than those already known by the system, by considering changes from normal behavior. The system uses artificial neural networks in the processes of detecting intrusions and taking countermeasures. A prototype is implemented and submitted to some simulations and tests, with three different types of attacks of Denial of Service (DoS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. AirDefense. Enterprise class wireless intrusion prevention systems: Requirements and figure of merit. Available at http://www.airdefense.net/whitepapers/. Access on November 2007.

  2. AirMagnet. Manual do usuário - airmagnet laptop wireless lan analyzer user guide. Available at http://www.airmagnet.com/. Access Jul 2008.

  3. J. Bellardo and S. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. Proceedings of the USENIX Security Symposium, August 2003.

    Google Scholar 

  4. P. Charles. Jpcap. Available at http://sourceforge.net/projects/jpcap/.

  5. K. Curran and E. Smyth. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. Information Systems Security, 15(4):17–38, Set/Out 2006.

    Article  Google Scholar 

  6. D. Dasgupta, J. Gómez, F. González, M. Kaniganti, K. Yallapu, and R. Yarramsetti. MMDS: Multilevel Monitoring and Detection System. Proceedings of the 15th Annual Computer Security Incident Handling Conference.

    Google Scholar 

  7. J. L. DeBoer and T. Bruinsma. Airsnare. Available at http://home.comcast.net/jay.deboer/airsnare/. Access Dec 2007.

  8. B. Fenner, G. Harris, and M. Richardson. Libpcap. Available at http://sourceforge.net/projects/libpcap/. Access Dec 2007.

  9. Finisar. Surveyor wireless. Access Jul 2007. Available at http://investor.finisar.com/ReleaseDetail.cfm?ReleaseID=89597.

  10. S. Haykin. Redes Neurais: Princípios e Prática. Bookman, Porto Alegre, 2 edition, 2001.

    Google Scholar 

  11. T. Karygiannis and L. Owens. Wireless network security. Technical Report NIST 800–48, National Institute of Standards and Technology, USA, November 2002. Available at http://csrc.nist.gov/publications/nistpubs/800–94/SP800–48.pdf.

  12. Kismet. Kismet wireless. Available at http://www.kismetwireless.net.

  13. R. A. Lackey, J. and J. Goddard. Wireless intrusion detection. Technical report, IBM Global Services, 2003.

    Google Scholar 

  14. Y. Lim, T. Schmoyer, J. Levine, and H. L. Owen. Wireless Intrusion Detection and Response. Proceedings of the 2003 IEEE Workshop on Information Assurance, March 2003.

    Google Scholar 

  15. A. Lockhart. Snort-wireless project. Available at http://www.snortwireless.org/. Access Nov 2007.

  16. MATLAB. The mathworks - MATLAB and simulink for technical computing. Available at http://www.mathworks.com/products/matlab/.

  17. G. G. Meade. Guidelines for the development and evaluation of IEEE 802.11 intrusion detection systems (IDS)), Technical report, NSA Num I332–005R-2005. 2005

    Google Scholar 

  18. M. Moradi and M. Zulkernine. A Neural Network Based System for Intrusion Detection and Classification of Attacks. Proceedings of 2004 IEEE International Conference on Advances in Intelligent Systems Theory and Applications, page 6, November 2004.

    Google Scholar 

  19. D. Pleskonjic. Wireless Intrusion Detection Systems (WIDS). 19th Annual Computer Security Applications Conference, December 2003.

    Google Scholar 

  20. Red-M. Taking control of wireless. Available at http://www.red-m.com/.

  21. T. R. Schmoyer, Y. X. Lim, and H. L. Owen. Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. IEEE Wireless Communications and Networking Conference, March 2004.

    Google Scholar 

  22. H. Yang, L. Xie, and J. Sun. Intrusion Detection Solution to WLANs. IEEE 6th CAS Symp. On Emerging Technologies: Mobile and Wireless Comm., June 2004.

    Google Scholar 

  23. L. Yanheng, D. Tian, and B. Li. A wireless intrusion detection method based on dynamic growing neural network. 1st International Multi- Symposium on Computer and Computational Sciences, 2006.

    Google Scholar 

Download references

Acknowledgment

Financial support of FAPEMA is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ricardo Luis da Rocha Ataide or Zair Abdelouahab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

da Rocha Ataide, R.L., Abdelouahab, Z. (2010). An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_61

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_61

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics