Browsing SUNY Polytechnic Institute by Subject "intrusion detection systems"
Now showing items 1-2 of 2
An Empirical Wi-Fi Intrusion Detection SystemToday, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. Intrusion Detection Systems detect the attacks by inspecting the network traffics or logs. The work demonstrated the effectiveness of detecting the attacks using machine learning techniques on the AWID dataset, which is produced from real wireless network logging. The author of the AWID dataset may have used several supervised learning models to successfully detect the intrusions. In this paper, we propose a newer approach for intrusion detection model based on dense neural networks, and long short-term memory networks (LSTM) and evaluate the model against the AWID-CLS-R subset. To get the best results from the model, we applied feature selection by replacing the unknown data with the value of “none”, getting rid of all repeated values, and kept only the important features. We did preprocess and feature scaling of both training and testing dataset, additional we also change the 2-dimensional to the 3- dimensional array because LSTM takes an input of 3-dimensional array, and later we used flatten layers to change into a 2-dimensional array for output. A comprehensive evaluation of DNN and LSTM networks are used to classify and predict the attacks and compute the precision, recall, and F1 score. We perform binary classification and multiclass classification on the dataset using neural networks and achieve accuracy ranging from 86.70 % to 96.01%.
Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave the way for additional new capabilities and support connectivity for applications like smart homes and cities, industrial automation, autonomous vehicles, telemedicine, and virtual/augmented reality. However, attackers use these resources in their advantages to speed up the attacking process. This report evaluates four different machine learning and deep learning approaches namely the Naïve Bayes model, the logistic regression model, the decision tree model, and the random forest model. The performance evaluation and the validation of these approaches are discussed in details in this report.