Intrusion Detection for WiFi Network: A Deep Learning Approach
With the popularity and development of Wi-Fi network, network security has become a key concern in the recent years. The amount of network attacks and intrusion activities are growing rapidly. Therefore, the continuous improvement of Intrusion Detection Systems (IDS) is necessary. In this paper, we analyse different types of network attacks in wireless networks and utilize Stacked Autoencoder (SAE) and Deep Neural Network (DNN) to perform network attack classification. We evaluate our method on the Aegean WiFi Intrusion Dataset (AWID) and preprocess the dataset by feature selection. In our experiments, we classified the network records into 4 types: normal record, injection attack, impersonation attack and flooding attack. The classification accuracies we achieved of these 4 types of records are 98.4619\(\%\), 99.9940\(\%\), 98.3936\(\%\) and 73.1200\(\%\), respectively.
KeywordsWi-fi network Network intrusion detection Deep learning
This work was supported in part by the National Natural Science Foundations of CHINA (Grant No. 61771390, No. 61501373, No. 61771392, and No. 61271279), the National Science and Technology Major Project (Grant No. 2016ZX03001018-004, and No. 2015ZX03002006-004), the Fundamental Research Funds for the Central Universities (Grant No. 3102017ZY018), and the Science and Technology on Communication Networks Laboratory Open Projects (Grant No. KX172600027).
- 1.KDDCUP99, Kdd cup99 data set (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 15 Jan 2018
- 2.NSL-KDD, NSL-KDD data set for network-based intrusion detection systems (2009). http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html. Accessed 15 Jan 2018
- 3.Kolias, C., Kambourakis, G., Stavrou, A., et al.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset [J]. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2016)Google Scholar
- 4.Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., et al.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection [J]. IEEE Trans. Inf. Forensics Secur. PP(99), 1–1 (2018)Google Scholar
- 5.Aminanto, M.E., Tanuwidjaja, H.C., Yoo, P.D., et al.: Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier [C]. In: International Workshop on Big Data and Information Security, pp. 99–104 (2018)Google Scholar
- 7.Thing, V.L.L.: IEEE 802.11 network anomaly detection and attack classification: a deep learning approach [C]. In: Wireless Communications and Networking Conference, pp. 1–6. IEEE (2017)Google Scholar
- 8.He, K., Zhang, X., Ren, S., et al.: Delving deep into rectifiers: surpassing human-level performance on ImageNet classification [J]. pp. 1026–1034 (2015)Google Scholar
- 9.Larose, D.T.: Data Preprocessing, Discovering Knowledge in Data: An Introduction to Data Mining, pp. 27–40. Wiley (2014)Google Scholar