The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resources. The vulnerability is amplified due to clear beacon, probe request and probe response frames. The research is to detect PRFA of Wireless Local Area Networks (WLAN) using a Supervised Feedforward Neural Network (NN). The NN converged outstandingly with train, valid, test sample percentages 70, 15, 15 and hidden neurons 20. The effectiveness of an Intruder Detection System depends on its predict...
This paper discusses an application of a neural network in wireless sensor network security. It pres...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Genetic Programming (GP) based Intrusion Detection Sys-tems (IDS) use connection state network data ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Loc...
Part 18: The Applications of Soft Computing to Telecommunications (ASCOTE) WorkshopInternational aud...
IEEE 802.11 wireless networks (WLANs) through its evolution stages are vulnerable for service availa...
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities ...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intru...
The serious issue in the field of wireless communication is the security and how an organization imp...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Abstract—Data Link layer attacks on WiFi networks are known to be one of the weakest points of WiFi ...
Concurrent with the ever-increasing growth of information and communication technology (ICT) and the...
Security plays a pivotal role in most applications of wireless sensor networks. It is common to find...
This paper discusses an application of a neural network in wireless sensor network security. It pres...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Genetic Programming (GP) based Intrusion Detection Sys-tems (IDS) use connection state network data ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Loc...
Part 18: The Applications of Soft Computing to Telecommunications (ASCOTE) WorkshopInternational aud...
IEEE 802.11 wireless networks (WLANs) through its evolution stages are vulnerable for service availa...
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities ...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intru...
The serious issue in the field of wireless communication is the security and how an organization imp...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Abstract—Data Link layer attacks on WiFi networks are known to be one of the weakest points of WiFi ...
Concurrent with the ever-increasing growth of information and communication technology (ICT) and the...
Security plays a pivotal role in most applications of wireless sensor networks. It is common to find...
This paper discusses an application of a neural network in wireless sensor network security. It pres...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Genetic Programming (GP) based Intrusion Detection Sys-tems (IDS) use connection state network data ...