Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib.

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Jaringan Komputer Lanjut Ethernet dan IEEE LAN Standard -Aurelio Rahmadian-
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Data Link Layer Network Fundamentals – Chapter 7.
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection Nelcileno Araújo Ruy de Oliveira Ed’Wilson Tavares Ferreira Valtemir Nascimento.
XPRESS: A Cross-Layer Backpressure Architecture for Wireless Multi-Hop Networks Rafael Laufer, Theodoros Salonidis, Henrik Lundgren, Pascal Le Guyadec.
Two Types of Fragmentation
Internetworking Introduction How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Fragmentation.
Wireless Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Ethernet Network Fundamentals – Chapter 9.
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
Bridges. Figure 6.79 Bridges Operate at the data link layer Also use backward learning in recording source address on transmissions Unlike repeaters,
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
LOCAL AREA NETWORKS. MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Ethernet Network Fundamentals. Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
LOCAL AREA NETWORKS. LAN PROTOCOL ARCHITECTURE The basic functions of a LAN is organized by set of layering protocols. IEEE 802 Reference Model Protocols.
Wired LAN: Ethernet.
Chabot College ELEC Layer 2 - Highlights.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Ethernet Network Fundamentals – Chapter 9.
Ethernet Standards IEEE802.3
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
University of Kansas Motivation Wireless networks based on the IEEE standard require lengthy layer two configuration parameters to be set SSID (Network.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Motion Detection Frame 1Frame 2 Anomalous activity.
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
After 7.1 Last modified
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Network Fundamentals – Chapter 9
EA C451 (Internetworking Technologies)
Computer Networks.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Abdul Kader Kabbani (Stanford University)
Introduction to Data-Link Layer
ISO-OSI Reference Model and IEEE Standards
Network Architecture Introductory material
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Encapsulation/Decapsulation
Network Fundamentals – Chapter 9
Lecture 13 review Explain how distance vector algorithm works.
Dynamic Routing Using Inter Capsule Routing Protocol Between Capsules
Review of Important Networking Concepts
Network Fundamentals – Chapter 9
802 Layering 802 Committee Subdivided the Data Link Layer OSI 802
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Network Fundamentals – Chapter 9
Data Link Layer 2019/2/19.
The Graduate College Travel Summary Presentation
MPCP General Description
Figure 3.1 Internet model.
Network Fundamentals – Chapter 9
Network Fundamentals – Chapter 9
Network Fundamentals – Chapter 9
OSI Data Link Layer Presented By Dr. Waleed Alseat Mutah University.
Network Fundamentals – Chapter 9
Presentation transcript:

Selecting the Best Set of Features for Efficient Intrusion Detection in Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Types of attacks De-authentication attack Chop-Chop attack Fragmentation attack Duration attack frames with NAV(network allocation vector)

Selecting approach Most of the intrusion detection systems examine only network layer and higher abstraction layers for extracting and selecting features and ignore the MAC layer header. In this approach, we rank the features using an independent measure: the information gain ratio. The k-means classifier’s predictive accuracy is used to reach an optimal set of features that maximize the accuracy of detection of the wireless attacks.

Selecting approach

Features of layer 2 in Wi-Fi : Logical Link Control (LLC) and Media Access Control (MAC)

Information gain ratio

Result