Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

Elhigazi Abdallah, Abdallah, Hamdan, Mosab, Abd Razak, Shukor, A. Ghalib, Fuad, Hamzah, Muzaffar, Khan, Suleman, Ahmed Babikir Ali, Siddiq, H. H. Khairi, Mutaz and Salih, Sayeed (2022) Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network. Computers, Materials & Continua, 74 (3). pp. 5607-5623. ISSN 1546-2218

[thumbnail of VOR]
Preview
PDF (VOR) - Published Version
Available under License Creative Commons Attribution.

959kB

Official URL: https://doi.org/10.32604/cmc.2023.031047

Abstract

IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to overcome many wireless network attacks, effectively detecting such attacks is crucial in today’s real-world applications. This paper presents a novel resource exhaustion attack detection scheme (READS) to detect resource exhaustion attacks effectively. The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack. The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in the WLAN. The proposed scheme consists of four modules which make it capable to alleviates the attack impact more effectively than the related work. The experimental results show the effectiveness of the proposed technique by gaining an 89.11% improvement compared to the existing works in terms of detection.


Repository Staff Only: item control page