Avaliação do Classificador ARTMAP Fuzzy em redes 802.11 com Criptografia Pré-Robust Security Network (WEP e WPA)
Abstract
Recent years have seen strong growth in the use of 802.11 wireless technology (Wireless LAN) and the security mechanisms implemented by IEEE 802.11i e IEEE 802.11w amendments have been shown to be ineffective in combating attacks against the availability of WLAN services. This paper evaluates the performance of Fuzzy ARTMAP classifier in the detection of a group of denial of service (DoS) attacks in a real WLAN supporting WEP and WPA encryption. Fuzzy ARTMAP neural network was selected because it is able to retain previously acquired knowledge and adapt to new classification patterns. The results obtained in terms of detection rate and false alarms rate suggest that there is a need for a metaheuristic to provide more reliable parameters for the performance of the classifier and the selection of most representative features about intrusive behavior exists in DoS attacks.References
Ahmad, I., Abdullah, A. e Alghamdi, A. (2010) “Towards the selection of best neural network system for intrusion detection”, International Journal of the Physical Sciences, vol. 5, n. 12, p. 1830-1839.
Ahmad, M. S., Tadakamadla, S. (2011) “Short paper: security evaluation of IEEE 802.11w specification”, Proceedings of the fourth ACM conference on Wireless network security, p. 53 - 58.
Aircrack (2011), http://www.aircrack-ng.org/.
Bellardo, J. e Savage, S. (2003) “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”, Proceedings of the 12th Conference on USENIX Security Symposium, vol. 12, p. 15-28.
Bicakci, K. e Tavli, B. (2009) “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks”, Computer Standards & Interfaces, v. 31, n. 5, p. 931-941.
Bittau, A., Handley, M. e Lackey, J. (2006) “The Final Nail in WEP's Coffin”, Proceedings of the 2006 IEEE Symposium on Security and Privacy, p. 386-400.
Carpenter, G., Grossberg, S., Markuzon, N., Reynold, J. e Rosen, D. (1992) “Fuzzy ARTMAP: A neural network for incremental supervised learning of analog multidimensional maps”, IEEE Transactions on Neural Network, vol. 3, n. 5, p. 689-713.
IDC – BRASIL (2012) “Estudo da IDC revela que foram vendidos aproximadamente 9 milhões de smartphones no Brasil em 2011”, http://www.idclatin.com/news.asp?ctr=bra&year=2012&id_release=2213, Abril.
IDC – BRASIL (2012) “Brasil comercializa 15,4 milhões de computadores em 2011 e se consolida na terceira posição do mercado mundial, segundo pesquisa da IDC”, http://www.idclatin.com/news.asp?ctr=bra&year=2012&id_release=2200, Abril.
IEEE Std. 802.11 (1999) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, p. 1-512.
IEEE Std. 802.11 (2004) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications – Amendment 6: Medium Access Control (MAC) Security Enhancements ”, p. 1-175.
IEEE Std. 802.11w (2009) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 4: Protected Management Frames”, p. 1-92.
Lerner, B. e Guterman, H. (2008) “Advanced Developments and Applications of the Fuzzy ARTMAP Neural Network in Pattern Classification”, In Studies in Computational Intelligence, vol. 137, p. 77-107, Spring-Verlag.
Santra, A. K., Nagarajan, S. e Jinesh, V. N. (2012) “ Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC)”, International Journal of Computer Applications, vol. 39, n. 4, p. 23-31.
Vilakazi, C. e Marwala, T. (2007) “Application of Feature Selection and Fuzzy ARTMAP to Intrusion Detection”, Proceedings of the Conference International on Systems, Man and Cybernetics, p. 4880-4885.
Weka (2011), http://www.cs.waikato.ac.nz/ml/weka/.
Wireshark (2011), http://www.wireshark.org/.
Wu, S. e Banzhaf, W. (2010) “The Use of Computational Intelligence in Intrusion Detection Systems: A Review”, In Applied Soft Computing, vol.10, p. 1-35.
Ahmad, M. S., Tadakamadla, S. (2011) “Short paper: security evaluation of IEEE 802.11w specification”, Proceedings of the fourth ACM conference on Wireless network security, p. 53 - 58.
Aircrack (2011), http://www.aircrack-ng.org/.
Bellardo, J. e Savage, S. (2003) “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”, Proceedings of the 12th Conference on USENIX Security Symposium, vol. 12, p. 15-28.
Bicakci, K. e Tavli, B. (2009) “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks”, Computer Standards & Interfaces, v. 31, n. 5, p. 931-941.
Bittau, A., Handley, M. e Lackey, J. (2006) “The Final Nail in WEP's Coffin”, Proceedings of the 2006 IEEE Symposium on Security and Privacy, p. 386-400.
Carpenter, G., Grossberg, S., Markuzon, N., Reynold, J. e Rosen, D. (1992) “Fuzzy ARTMAP: A neural network for incremental supervised learning of analog multidimensional maps”, IEEE Transactions on Neural Network, vol. 3, n. 5, p. 689-713.
IDC – BRASIL (2012) “Estudo da IDC revela que foram vendidos aproximadamente 9 milhões de smartphones no Brasil em 2011”, http://www.idclatin.com/news.asp?ctr=bra&year=2012&id_release=2213, Abril.
IDC – BRASIL (2012) “Brasil comercializa 15,4 milhões de computadores em 2011 e se consolida na terceira posição do mercado mundial, segundo pesquisa da IDC”, http://www.idclatin.com/news.asp?ctr=bra&year=2012&id_release=2200, Abril.
IEEE Std. 802.11 (1999) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, p. 1-512.
IEEE Std. 802.11 (2004) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications – Amendment 6: Medium Access Control (MAC) Security Enhancements ”, p. 1-175.
IEEE Std. 802.11w (2009) “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 4: Protected Management Frames”, p. 1-92.
Lerner, B. e Guterman, H. (2008) “Advanced Developments and Applications of the Fuzzy ARTMAP Neural Network in Pattern Classification”, In Studies in Computational Intelligence, vol. 137, p. 77-107, Spring-Verlag.
Santra, A. K., Nagarajan, S. e Jinesh, V. N. (2012) “ Intrusion Detection in Wireless Networks using FUZZY Neural Networks and Dynamic Context-Aware Role based Access Control Security (DCARBAC)”, International Journal of Computer Applications, vol. 39, n. 4, p. 23-31.
Vilakazi, C. e Marwala, T. (2007) “Application of Feature Selection and Fuzzy ARTMAP to Intrusion Detection”, Proceedings of the Conference International on Systems, Man and Cybernetics, p. 4880-4885.
Weka (2011), http://www.cs.waikato.ac.nz/ml/weka/.
Wireshark (2011), http://www.wireshark.org/.
Wu, S. e Banzhaf, W. (2010) “The Use of Computational Intelligence in Intrusion Detection Systems: A Review”, In Applied Soft Computing, vol.10, p. 1-35.
Published
2012-11-19
How to Cite
ARAÚJO, Nelcileno; OLIVEIRA, Ruy de; SHINODA, Ailton Akira; FERREIRA, Ed’Wilson Tavares; NASCIMENTO, Valtemir Emerêncio do.
Avaliação do Classificador ARTMAP Fuzzy em redes 802.11 com Criptografia Pré-Robust Security Network (WEP e WPA). In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 12. , 2012, Curitiba.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2012
.
p. 310-316.
DOI: https://doi.org/10.5753/sbseg.2012.20555.
