A dataset for evaluating intrusion detection systems in IEEE 802.11 wireless networks

Internet access by wireless networks has grownconsiderably in recent years. However, these networks are vulnerable to security problems, especially those related to denial of service attacks. Intrusion Detection Systems(IDS)are widely used to improve network security, but comparison among the several existing approaches is not a trivial task. This paperproposes building a datasetfor evaluating IDS in wireless environments. The data were captured in a real, operating network. We conducted tests using traditional IDS and achievedgreat results, which showed the effectiveness of our proposed approach.

[1]  Wright-Patterson Afb,et al.  Feature Selection Using a Multilayer Perceptron , 1990 .

[2]  Md. Sohail Ahmad,et al.  Short paper: security evaluation of IEEE 802.11w specification , 2011, WiSec '11.

[3]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[4]  Mark Handley,et al.  The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[5]  Nir Friedman,et al.  Bayesian Network Classifiers , 1997, Machine Learning.

[6]  M. Ravikanth,et al.  Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2011 .

[7]  Mr T. Kalaikumaran,et al.  Feature Selection for Wireless Intrusion Detection System Using Filter and Wrapper Model , 2012 .

[8]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[9]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[10]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[11]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[12]  John Mark,et al.  Introduction to radial basis function networks , 1996 .

[13]  Pan Feng,et al.  Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).

[14]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[15]  B. B. Meshram,et al.  Survey of Attacks on Wireless Network , 2013 .

[16]  Khalil El-Khatib,et al.  Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[17]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[18]  Helena Sandström,et al.  A survey of the denial of service problem , 2001 .

[19]  Richard Lippmann,et al.  The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.

[20]  John Bell,et al.  A review of methods for the assessment of prediction errors in conservation presence/absence models , 1997, Environmental Conservation.