Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

3Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classificationbased methods inaccurate in differentiating between real and false messages. Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks, effectively detecting such attacks is crucial in today's real-world applications. This paper presents a novel resource exhaustion attack detection scheme (READS) to detect resource exhaustion attacks effectively. The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack. The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN. The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work. The experimental results show the effectiveness of the proposed technique by gaining an 89.11% improvement compared to the existing works in terms of detection.

Cite

CITATION STYLE

APA

Abdallah, A. E., Hamdan, M., Razak, S. A., Ghalib, F. A., Hamzah, M., Khan, S., … Salih, S. (2023). Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network. Computers, Materials and Continua, 74(3), 5607–5623. https://doi.org/10.32604/cmc.2023.031047

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free