Enhancing Wireless Intrusion Detection Using Machine Learning Classification with Reduced Attribute Sets

In cybersecurity, machine learning approaches can predict and detect threats before they result in major security incidents. The design and perform ance of an effective machine learning based Intrusion Detection System (IDS) depends upon the selected attributes and the classifier model. This paper considers multi-class classification for the Aegean Wi-Fi Intrusion Dataset (AWID) where classes represent 17 types of the IEEE 802.11 MAC Layer attacks. The proposed work extracts four attribute sets of 32, 10, 7 and 5 attributes, resp ectfully. The classifiers achieved high accuracy with minimum false positive rates, and the presented work outperforms previous related work in terms of number of classes, attributes and accuracy. The proposed work achieved maximum accuracy of 99.64% for Random Forest with supply test and 99.99% usi ng the 10-fold cross validation approach for Random Forest and J48.

[1]  Qiang Shen,et al.  Feature Selection With Harmony Search , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[2]  Kwangjo Kim,et al.  Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[3]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[4]  Ken Ferens,et al.  A Cognitive Multi-agent Model to Detect Malicious Threats , 2017 .

[5]  Mark Goadrich,et al.  The relationship between Precision-Recall and ROC curves , 2006, ICML.

[6]  Lei Xu,et al.  Best first strategy for feature selection , 1988, [1988 Proceedings] 9th International Conference on Pattern Recognition.

[7]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[8]  Miriya Thanthrige,et al.  Hidden Markov Model Based Intrusion Alert Prediction , 2016 .

[9]  J. Friedman Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .

[10]  Shailendra Sahu,et al.  Network intrusion detection system using J48 Decision Tree , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[11]  Vrizlynn L. L. Thing,et al.  IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[13]  Trevor Hastie,et al.  Additive Logistic Regression : a Statistical , 1998 .

[14]  김광조,et al.  Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning , 2016 .

[15]  Pedro M. Domingos MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.

[16]  Jiujun Cheng,et al.  Research on the Matthews Correlation Coefficients Metrics of Personalized Recommendation Algorithm Evaluation , 2015 .

[17]  Kwangjo Kim,et al.  Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks , 2016 .

[18]  Xianbin Wang,et al.  Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).