Skip to main content

Deep Learning Models for Intrusion Detection in Wi-Fi Networks: A Literature Survey

  • Conference paper
  • First Online:
Sustainable Architecture and Building Environment

Part of the book series: Lecture Notes in Civil Engineering ((LNCE,volume 161))

Abstract

Recently, the number of devices that are connected to the Internet are increasing exponentially due to the rise of the Internet of Things (IoT) era. Despite many advancements of the IoT era, we have been exposed to cyber security threats. Moreover, in this Covid-19 pandemic situation, the trend of cyber crimes is also increasing sharply. In this paper, we discuss one of possible countermeasures to combat cyber threats, namely Intrusion Detection Systems (IDS). IDS usually leverage many different types of machine learning models to detect the unknown attacks. In order to avoid confusion for future researchers in this field, we examine several states of the art papers which leverage deep learning for IDS in Wi-Fi networks. For this purpose, we choose one common Wi-Fi networks dataset, called AWID dataset. By examining the recent studies, we are able to understand current problems of IDS in Wi-Fi networks and able to prepare the best machine learning model for the corresponding problem to achieve a safe environment with minimal risk of cyber threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. SHUSUKE MURAI. New Tokyo research center aims to boost Japan’s fourth industrial revolution. Available on https://www.japantimes.co.jp/news/2018/07/05/business/tech/new-tokyo-research-center-aims-boost-japans-fourth-industrial-revolution/#.W2wwVigzbb0

  2. Revenue of the internet of things in Japan from 2013 to 2020 (in billion U.S. dollars). Available on https://www.statista.com/statistics/512254/iot-revenue-japan/

  3. Internet of Things (IoT) Connected devices installed base worldwide from 2015 to 2025 (in billions). Available on https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

  4. iGateResearch. South Korea smart home market, volume, household penetration & key company analysis—forecast to 2024. Available on https://www.researchandmarkets.com/research/j22c7g/south_korea_smart?w=5

  5. Laura W. South Korea smart home market 2017-2024: household penetration for smart home applications is expected to hit above 45%. Available on https://www.prnewswire.com/news-releases/south-korea-smart-home-market-2017-2024-household-penetration-for-smart-home-applications-is-expected-to-hit-above-45-300573827.html

  6. Antara News Infographic. Cyber crime trend is on the rise. Available on https://www.antaranews.com/infografik/1571604/tren-kejahatan-siber-meningkat

  7. Media Indonesia. Criminal investigation unit of POLRI: number of cyber crimes increasing since January. Available on https://mediaindonesia.com/read/detail/322327-bareskrim-polri-jumlah-kejahatan-siber-meningkat-sejak-januari

  8. Welcoming Bhayangkara Anniversary. Bareskrim holds “Cyber Police Festival”. Available on https://www.antaranews.com/berita/1565120/sambut-hut-bhayangkara-bareskrim-gelar-cyber-police-festival

  9. Sforzin A et al (2016) RPiDS: Raspberry Pi IDS—a fruitful intrusion detection system for IoT. In: 2016 international IEEE conferences ubiquitous intelligence & computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE

    Google Scholar 

  10. Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) Learning internet-of-things security “hands-on”. IEEE Secur Priv 14(1):37–46

    Article  Google Scholar 

  11. Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642

    Article  Google Scholar 

  12. Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of symposium on security and privacy, Berkeley, California. IEEE, pp 305–316

    Google Scholar 

  13. Anthes G (2013) Deep learning comes of age. Commun ACM 56(6):13–15

    Article  Google Scholar 

  14. Saxe J, Berlin K (2015) Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th international conference on malicious and unwanted software (MALWARE). IEEE, pp 11–20

    Google Scholar 

  15. Laskov P, Düssel P, Schäfer C, Rieck K (2005) Learning intrusion detection: supervised or unsupervised? In: International conference on image analysis and processing. Springer, Berlin, Heidelberg, pp 50–57

    Google Scholar 

  16. Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on applied computing, pp 412–419

    Google Scholar 

  17. Tsang CH, Kwong S (2006) Ant colony clustering and feature extraction for anomaly intrusion detection. In: Swarm intelligence in data mining. Springer, Berlin, Heidelberg, pp 101–123

    Google Scholar 

  18. Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutorials 18(1):184–208

    Google Scholar 

  19. Vaca FD, Niyaz Q (2018) An ensemble learning based wi-fi network intrusion detection system (wnids). In: 2018 IEEE 17th international symposium on network computing and applications (NCA). IEEE, pp 1–5

    Google Scholar 

  20. Wang S, Li B, Yang M, Yan Z (2018) Intrusion detection for WiFi network: a deep learning approach. In: International wireless internet conference. Springer, Cham, pp 95–104

    Google Scholar 

  21. Ran J, Ji Y, Tang B (2019) A semi-supervised learning approach to IEEE 802.11 network anomaly detection. In: 2019 IEEE 89th vehicular technology conference (VTC2019-Spring). IEEE, pp 1–5

    Google Scholar 

  22. Parker LR, Yoo PD, Asyhari TA, Chermak L, Jhi Y, Taha K (2019) DEMISe: interpretable deep extraction and mutual information selection techniques for IoT intrusion detection. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1–10

    Google Scholar 

  23. Aminanto ME, Choi R, Tanuwidjaja HC, Yoo PD, Kim K (2018) Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans Inf Forensics Secur 13(3):621–636

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Achmad Eriza Aminanto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aminanto, A.E., Aminanto, M.E. (2022). Deep Learning Models for Intrusion Detection in Wi-Fi Networks: A Literature Survey. In: Yola, L., Nangkula, U., Ayegbusi, O.G., Awang, M. (eds) Sustainable Architecture and Building Environment . Lecture Notes in Civil Engineering, vol 161. Springer, Singapore. https://doi.org/10.1007/978-981-16-2329-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2329-5_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2328-8

  • Online ISBN: 978-981-16-2329-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics