Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 20 (2023)  /  Artículo
ARTÍCULO
TITULO

Threat Detection Model for WLAN of Simulated Data Using Deep Convolutional Neural Network

Omar I. Dallal Bashi    
Shymaa Mohammed Jameel    
Yasir Mahmood Al Kubaisi    
Husamuldeen K. Hameed and Ahmad H. Sabry    

Resumen

Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be simply mocked. Therefore, a further protected key uses new information by combining these simple digital identifiers with an RF signature of the radio link. In this work, a design of a convolutional neural network (CNN) based on fingerprinting radio frequency (RF) is developed with computer-generated data. The developed CNN is trained with beacon frames of a wireless local area network (WLAN) that is simulated as a result of identified and unidentified router nodes of fingerprinting RF. The proposed CNN is able to detect router impersonators by comparing the data pair of the MAC address and RF signature of the received signal from the known and unknown routers. ADAM optimizer, which is the extended version of stochastic gradient descent, has been used with a developed deep learning convolutional neural network containing three fully connected and two convolutional layers. According to the training progress graphic, the network converges to around 100% accuracy within the first epoch, which indicates that the developed architecture was efficient in detecting router impersonations.

 Artículos similares

       
 
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information

 
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz    
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi... ver más
Revista: Informatics

 
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari    
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c... ver más
Revista: Information

 
Jiju Guo, Wengeng Cao, Guohui Lang, Qifa Sun, Tian Nan, Xiangzhi Li, Yu Ren and Zeyan Li    
The presence of high concentrations of geogenic arsenic (As) in groundwater poses a serious threat to the health of millions of individuals globally. This paper examines the research progress of groundwater with high concentrations of geogenic As through... ver más
Revista: Water

 
Francesco Bergadano and Giorgio Giacinto    
Revista: Algorithms