An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks

  • Ricardo Luis da Rocha AtaideEmail author
  • Zair AbdelouahabEmail author
Conference paper


The majority existing wireless intrusion detection systems identifies intrusive behaviors are based on the exploration of known vulnerabilities called signatures of attacks. With this mechanism, only known vulnerabilities are detected which leads to bringing the necessity of new techniques to add in the system. This work considers an architecture for intrusion detection in wireless network based on anomaly. The system is capable to adapt itself to a profile of a new community of users, as well as recognizing attackswith different characteristics than those already known by the system, by considering changes from normal behavior. The system uses artificial neural networks in the processes of detecting intrusions and taking countermeasures. A prototype is implemented and submitted to some simulations and tests, with three different types of attacks of Denial of Service (DoS).


Artificial Neural Network Wireless Network Access Point Sensor Module Intrusion Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.



Financial support of FAPEMA is gratefully acknowledged.


  1. [1]
    AirDefense. Enterprise class wireless intrusion prevention systems: Requirements and figure of merit. Available at Access on November 2007.
  2. [2]
    AirMagnet. Manual do usuário - airmagnet laptop wireless lan analyzer user guide. Available at Access Jul 2008.
  3. [3]
    J. Bellardo and S. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. Proceedings of the USENIX Security Symposium, August 2003.Google Scholar
  4. [4]
    P. Charles. Jpcap. Available at
  5. [5]
    K. Curran and E. Smyth. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. Information Systems Security, 15(4):17–38, Set/Out 2006.CrossRefGoogle Scholar
  6. [6]
    D. Dasgupta, J. Gómez, F. González, M. Kaniganti, K. Yallapu, and R. Yarramsetti. MMDS: Multilevel Monitoring and Detection System. Proceedings of the 15th Annual Computer Security Incident Handling Conference.Google Scholar
  7. [7]
    J. L. DeBoer and T. Bruinsma. Airsnare. Available at Access Dec 2007.
  8. [8]
    B. Fenner, G. Harris, and M. Richardson. Libpcap. Available at Access Dec 2007.
  9. [9]
    Finisar. Surveyor wireless. Access Jul 2007. Available at
  10. [10]
    S. Haykin. Redes Neurais: Princípios e Prática. Bookman, Porto Alegre, 2 edition, 2001.Google Scholar
  11. [11]
    T. Karygiannis and L. Owens. Wireless network security. Technical Report NIST 800–48, National Institute of Standards and Technology, USA, November 2002. Available at–94/SP800–48.pdf.
  12. [12]
    Kismet. Kismet wireless. Available at
  13. [13]
    R. A. Lackey, J. and J. Goddard. Wireless intrusion detection. Technical report, IBM Global Services, 2003.Google Scholar
  14. [14]
    Y. Lim, T. Schmoyer, J. Levine, and H. L. Owen. Wireless Intrusion Detection and Response. Proceedings of the 2003 IEEE Workshop on Information Assurance, March 2003.Google Scholar
  15. [15]
    A. Lockhart. Snort-wireless project. Available at Access Nov 2007.
  16. [16]
    MATLAB. The mathworks - MATLAB and simulink for technical computing. Available at
  17. [17]
    G. G. Meade. Guidelines for the development and evaluation of IEEE 802.11 intrusion detection systems (IDS)), Technical report, NSA Num I332–005R-2005. 2005Google Scholar
  18. [18]
    M. Moradi and M. Zulkernine. A Neural Network Based System for Intrusion Detection and Classification of Attacks. Proceedings of 2004 IEEE International Conference on Advances in Intelligent Systems Theory and Applications, page 6, November 2004.Google Scholar
  19. [19]
    D. Pleskonjic. Wireless Intrusion Detection Systems (WIDS). 19th Annual Computer Security Applications Conference, December 2003.Google Scholar
  20. [20]
    Red-M. Taking control of wireless. Available at
  21. [21]
    T. R. Schmoyer, Y. X. Lim, and H. L. Owen. Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. IEEE Wireless Communications and Networking Conference, March 2004.Google Scholar
  22. [22]
    H. Yang, L. Xie, and J. Sun. Intrusion Detection Solution to WLANs. IEEE 6th CAS Symp. On Emerging Technologies: Mobile and Wireless Comm., June 2004.Google Scholar
  23. [23]
    L. Yanheng, D. Tian, and B. Li. A wireless intrusion detection method based on dynamic growing neural network. 1st International Multi- Symposium on Computer and Computational Sciences, 2006.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Federal University of Maranhão, CCET/DEEESão LuisUSA

Personalised recommendations