DocumentCode :
1582256
Title :
Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks
Author :
Guennoun, Mouhcine ; Lbekkouri, Aboubakr ; El-Khatib, Khalil
Author_Institution :
Dept. Math-Info, Fac. des Sci. de Rabat, Rabat
fYear :
2008
Firstpage :
1
Lastpage :
4
Abstract :
Intrusion Detection Systems (IDS) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is very central to ensure the performance, speed of learning, accuracy, reliability of these detectors and to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems are basic information related to TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11 specific attacks such as de-authentication attack or MAC layer DoS attacks. In this paper, we propose a hybrid model that efficiently selects the optimal set of features in order to detect 802.11 specific intrusions. Our model of feature selection uses the information gain ratio measure as a mean to compute the relevance of each feature and the k-means classifier to select the optimal set of MAC layer features that can improve the accuracy of intrusion detection systems while reducing the learning time of their learning algorithm.
Keywords :
access protocols; feature extraction; security of data; telecommunication security; wireless LAN; 802.11 network; MAC layer; TCP/IP header; feature selection; illegal penetration; intrusion detection system; k-means classifier; Accuracy; Degradation; Detectors; Face detection; Filters; Intrusion detection; Predictive models; Protocols; Support vector machine classification; Support vector machines; Feature Selection; Information Gain Ratio; Intrusion Detection Systems; K-means; Wireless Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on
Conference_Location :
Damascus
Print_ISBN :
978-1-4244-1751-3
Electronic_ISBN :
978-1-4244-1752-0
Type :
conf
DOI :
10.1109/ICTTA.2008.4530270
Filename :
4530270
Link To Document :
بازگشت