메뉴 건너뛰기




Volumn , Issue , 2017, Pages

IEEE 802.11 network anomaly detection and attack classification: A deep learning approach

Author keywords

Anomaly detection; Attack classification; Deep learning; IEEE 802.11 attacks; IoT security

Indexed keywords

STANDARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85019760246     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2017.7925567     Document Type: Conference Paper
Times cited : (161)

References (23)
  • 3
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Lecture Notes in Computer Science, Springer
    • S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," in Selected Areas in Cryptography, Vol. 2259, pp. 1-24, Lecture Notes in Computer Science, Springer, 2001.
    • (2001) Selected Areas in Cryptography , vol.2259 , pp. 1-24
    • Fluhrer, S.R.1    Mantin, I.2    Shamir, A.3
  • 7
    • 84908247589 scopus 로고    scopus 로고
    • WPA too!
    • M. S. Ahmad, "WPA Too!" in DEFCON 18, 2010.
    • (2010) DEFCON , vol.18
    • Ahmad, M.S.1
  • 9
    • 84962359508 scopus 로고    scopus 로고
    • Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
    • C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," in IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 184-208, 2016.
    • (2016) IEEE Communications Surveys and Tutorials , vol.18 , Issue.1 , pp. 184-208
    • Kolias, C.1    Kambourakis, G.2    Stavrou, A.3    Gritzalis, S.4
  • 12
    • 84884203185 scopus 로고    scopus 로고
    • Network anomaly detection with the restricted boltzmann machine
    • U. Fiore, F. Palmieri, A. Castiglione, and A. D. Santis, "Network anomaly detection with the restricted boltzmann machine," in Nerocomputing, Vol. 22, pp. 13-23, 2013.
    • Nerocomputing , vol.22 , Issue.2013 , pp. 13-23
    • Fiore, U.1    Palmieri, F.2    Castiglione, A.3    Santis, A.D.4
  • 14
    • 84919328325 scopus 로고    scopus 로고
    • Role of feature selection in intrusion detection system for 802.11 networks
    • N. P. Neelakantan and C. Nagesh, "Role of feature selection in intrusion detection system for 802.11 networks," in International Journal on Smart Sensors Ad Hoc Network, Vol. 1, No. 1, pp. 98-101, 2011.
    • (2011) International Journal on Smart Sensors Ad Hoc Network , vol.1 , Issue.1 , pp. 98-101
    • Neelakantan, N.P.1    Nagesh, C.2
  • 16
    • 85019736647 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • KDD Cup, "Network traffic capture dataset," http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html, accessed on 12 September 2016.
    • Network Traffic Capture Dataset
  • 17
    • 85019731056 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • Aircrack-ng, "Wi-Fi network security tools," https://www.aircrackng. org, accessed on 12 September 2016.
    • Wi-Fi Network Security Tools
  • 18
    • 85019770552 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • KALI Tools, "Mdk3," http://tools.kali.org/wireless-attacks/mdk3, accessed on 12 September 2016.
    • Mdk3
  • 19
    • 84871173077 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • Metasploit, "Penetration testing software," https://www.metasploit.com, accessed on 12 September 2016.
    • Penetration Testing Software
  • 20
    • 85019695124 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • J. Wright, "File2air," http://www.willhackforsushi.com/?page id=19, accessed on 12 September 2016.
    • File2air
    • Wright, J.1
  • 21
    • 85019742556 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • Lorcon2, "Wireless packet injection," https://code.google.com/archive /p/lorcon, accessed on 12 September 2016.
    • Wireless Packet Injection
  • 22
    • 85019702360 scopus 로고    scopus 로고
    • accessed on 12 September 2016
    • TShark, "Network traffic analyser," https://www.wireshark.org, accessed on 12 September 2016.
    • Network Traffic Analyser


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.