8
Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Embed Size (px)

Citation preview

Page 1: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks

Mouhcine Guennoun

Aboubakr Lbekkouri

Khalil El-Khatib

Page 2: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Types of attacks• De-authentication attack

• Chop-Chop attack

• Fragmentation attack

• Duration attack• frames with NAV(network allocation vector)

Page 3: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Selecting approach• Most of the intrusion detection systems examine only

network layer and higher abstraction layers for extracting and selecting features and ignore the MAC layer header.

• In this approach, we rank the features using an independent measure: the information gain ratio. The k-means classifier’s predictive accuracy is used to reach an optimal set of features that maximize the accuracy of detection of the wireless attacks.

Page 4: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Selecting approach

Page 5: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Selecting approachFeatures of layer 2 in Wi-Fi : Logical Link Control (LLC) and Media Access Control (MAC)

Page 6: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Information gain ratiof ∈ F , F= {All features }

Page 7: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Information gain ratio

Page 8: Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks Mouhcine Guennoun Aboubakr Lbekkouri Khalil El-Khatib

Result