An Effective Approach for Security Attacks Based on Machine Learning Algorithms

  • Conference paper
  • First Online:
Advances in Computational Intelligence and Informatics (ICACII 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 119))

  • 351 Accesses

Abstract

The regular utilization of wireless network as well as mobile hot spot gives a remote network condition, recognition as well as hazard through Wi-Fi; security is relentlessly expanding, whereas the user utilizing authorized and unauthorized APsĀ (Access Points) in organization, cabinet, and armed forces offices, huge disadvantages are being subjected to different malicious codes and hacking assaults; it is important to notice illegal APs based on security of data. Here, user utilizes round-trip time (RTP) value dataset to identify legitimate and illegitimate access points over connected/remote networks. User also analyzes the performance of data utilizing the ML models, such as support vector machine, Classification 4.5, k-nearest neighbor (K-NN), multi-layer perceptron, and decision tree algorithms. This analysis determines the attacks on data in wired and remote networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jana S, Kasera SK (2010) On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans Mob Comput 9(3):449ā€“462

    ArticleĀ  Google ScholarĀ 

  2. Han H et al (2011) A timing-based scheme for rogue AP detection. IEEE Trans Parallel Distrib Syst 22(11):1912ā€“1925

    ArticleĀ  Google ScholarĀ 

  3. Awad F, Al-Refai M, Al-Qerem A (2017) Rogue access point localization using particle swarm optimization. In: 8th international conference on information and communication systems (ICICS), Irbid, Jordan, May 2017. https://doi.org/10.1109/iacs.2017.7921985

  4. Pradeepkumar B et al Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, Sept 2017. https://doi.org/10.1109/icacci.2017.8126135

  5. Este A, Gringoli F, Salgarelli L (2009) On the stability of the information carried by traffic flow features at the packet level. ACM SIGCOMM Comput Commun Rev 39(3):13ā€“18

    ArticleĀ  Google ScholarĀ 

  6. Peng, L et al (2016) Early stage internet traffic identification using data gravitation based classification. In: 2016 IEEE 14th international conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, 2nd international conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, New Zealand, Aug. 2016. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.98

  7. Awad F et al (2017) Access point localization using autonomous mobile robot. In: 2017 IEEE Jordan conference on applied electrical engineering and computing technologies (AEECT), Aqaba, Jordan, July 2017. https://doi.org/10.1109/iwcmc.2017.7986377

  8. Liu S, Liu Y, ** Z (2017) Attack behavioural analysis and secure access for wireless access point (AP) in open system authentication. In: 13th international wireless communications and mobile computing conference (IWCMC), Valencia, Spain, June 2017. https://doi.org/10.1109/IWCMC.2017.7986377

  9. Agarwal M, Biswas S, Nandi S (2018) An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks. Int J Wireless Inf Networks 25(3):120ā€“135

    Google ScholarĀ 

  10. Watkins L, Beyah R, Corbett C (2007) A passive approach to rogue access point detection. In: IEEE global telecommunications conference 2007, Washington, DC, USA, Nov 2007, pp 355ā€“360

    Google ScholarĀ 

  11. Yang C, Song Y, Gu G (2012) Active user-side evil twin access point detection using statistical techniques. IEEE Trans Inf Forensics Secur 7(5):1638ā€“1651

    ArticleĀ  Google ScholarĀ 

  12. Modi V, Parekh C (2017) Detection & analysis of evil twin attack in wireless network. Int J Adv Res Comput Sci 8(5):774ā€“777

    Google ScholarĀ 

  13. Altman NS (1992) An introduction to kernel and nearest-neighbor nonparametric regression. Am Stat 46(3):175ā€“185

    MathSciNetĀ  Google ScholarĀ 

  14. Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation. In: Parallel distributed processing: explorations in the microstructure of cognition, vol 1. MIT Press, Cambridge, pp 218ā€“362

    Google ScholarĀ 

  15. Vapnik V (2013) Support vector machine. In: The nature of statistical learning theory. Springer Science & Business Media, Berlin

    Google ScholarĀ 

  16. Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., Burlington

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aerpula Swetha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Swetha, A., Shailaja, K. (2020). An Effective Approach for Security Attacks Based on Machine Learning Algorithms. In: Chillarige, R., Distefano, S., Rawat, S. (eds) Advances in Computational Intelligence and Informatics. ICACII 2019. Lecture Notes in Networks and Systems, vol 119. Springer, Singapore. https://doi.org/10.1007/978-981-15-3338-9_34

Download citation

Publish with us

Policies and ethics

Navigation