Analysis of Machine Learning Methods for Intrusion Detection Systems in Wireless Networks

Authors

  • Muhammad Faseeh Sultan Faculty of Computing, Department of Computer Science and Information Technology, The Superior University, Lahore, 54000, Pakistan. Author https://orcid.org/0009-0000-6897-5072
  • Sammia Hira Faculty of Computing, Department of Computer Science and Information Technology, The Superior University, Lahore, 54000, Pakistan. Author https://orcid.org/0009-0005-5333-9299
  • Sohail Masood Bhatti Faculty of Computing, Department of Computer Science and Information Technology, The Superior University, Lahore, 54000, Pakistan. Author https://orcid.org/0000-0002-8210-2785
  • Allah Rakha Faculty of Computing, Department of Computer Science and Information Technology, The Superior University, Lahore, 54000, Pakistan. Author

DOI:

https://doi.org/10.61506/01.00343

Keywords:

wireless networks, machine learning, deep learning, classification, intrusion detection system

Abstract

Wireless networks have become integral to modern communication systems, making them vulnerable to various security threats. Intrusion detection systems (IDSs) are essential for detecting and mitigating these threats and can also powerfully screen network traffic for pernicious activities that are planned to abuse the classification, honesty, realness, and accessibility of the network. Machine learning (ML) and Deep learning (DL) techniques are effective in identifying and classifying network attacks. This study proposes a novel intrusion detection system that employs ML and DL models to classify and distinguish network attacks in wireless networks. The proposed system enhanced detection accuracy and efficiency in IDS, the scalability of IDS systems, and estimated the performance of IDS in wireless networks. It also investigates IDS techniques using machine learning, designs and implements IDS in wireless networks using machine learning, and trains several IDS models regarding wireless networks that are fitted. It contrasts the exhibition of proposed models and existing procedures. The suggested system can therefore be utilized as an effective IDS for wireless networks, providing real-time detection and classification of network attacks.

References

Abdulhammed, R., Faezipour, M., Abuzneid, A., & AbuMallouh, A. (2019). Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic. IEEE Sensors Letters, 3(1), 1–4. DOI: https://doi.org/10.1109/LSENS.2018.2879990

Abedin, M. Z., Siddiquee, K. N. E. A., Bhuyan, M. S., Karim, R., Hossein, M. S., & Andersson, K. (2018). Performance Analysis of Anomaly Based Network Intrusion Detection Systems. DOI: https://doi.org/10.1109/LCNW.2018.8628599

Aburomman, A. A., & Reaz, M. B. I. (2016). Survey of learning methods in intrusion detection systems. DOI: https://doi.org/10.1109/ICAEES.2016.7888070

Ahmad, Z., Khan, A. S., Shiang, C. W., Abdullah, J., & Ahmad, F. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). DOI: https://doi.org/10.1002/ett.4150

Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion Detection Systems in Wireless Sensor Networks: A Review. International Journal of Distributed Sensor Networks, 9(5), 167575. DOI: https://doi.org/10.1155/2013/167575

Aminanto, M. E., & Kim, K. (2017a). Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. In Lecture notes in computer science (pp. 136–147).

Aminanto, M. E., & Kim, K. (2017b). Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. In Lecture notes in computer science (pp. 136–147). DOI: https://doi.org/10.1007/978-3-319-56549-1_12

Bace, R., & Mell, P. (2001). NIST Special Publication on Intrusion Detection Systems. DOI: https://doi.org/10.6028/NIST.SP.800-31

Chandrabala P. Kothari, & Vaishali Kulkarni. (2014). Intrusion Detection System using Wireless Sensor Networks: a Review. IJERT, Volume 03, Issue 12 (December 2014)(2278–0181), IJERTV3IS120537.

Chang, Y., Li, W., & Yang, Z. (2017). Network Intrusion Detection Based on Random Forest and Support Vector Machine. DOI: https://doi.org/10.1109/CSE-EUC.2017.118

Chen, A. C. H., Jia, W. K., Hwang, F. J., Liu, G., Song, F., & Pu, L. (2022). Machine learning and deep learning methods for wireless network applications. EURASIP Journal on Wireless Communications and Networking, 2022(1). DOI: https://doi.org/10.1186/s13638-022-02196-2

Denning, D. (1987). An Intrusion-Detection Model. IEEE Transactions on Software Engineering, SE-13(2), 222–232. DOI: https://doi.org/10.1109/TSE.1987.232894

Djenouri, D., Khelladi, L., & Badache, A. (2005). A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys and Tutorials/IEEE Communications Surveys and Tutorials, 7(4), 2–28. DOI: https://doi.org/10.1109/COMST.2005.1593277

Gajawada, S. K. (2023, August 16). Chi-Square Test for Feature Selection in Machine learning. Medium.

GeeksforGeeks. (2023, February 6). XGBoost. GeeksforGeeks. https://www.geeksforgeeks.org/xgboost

Granato, G., Martino, A., Baldini, L., & Rizzi, A. (2020). Intrusion Detection in Wi-Fi Networks by Modular and Optimized Ensemble of Classifiers. DOI: https://doi.org/10.5220/0010109604120422

Gusarova, M. (2023, February 20). Decision Trees Explained. graphviz and shap - Maria Gusarova - Medium. Medium.

Hochin, T., Hirata, H., & Nomiya, H. (2017). 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2017).

Hodo, E., Bellekens, X. J. A., Hamilton, A. W., Tachtatzis, C., & Atkinson, R. C. (2017). Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv (Cornell University).

International Conference on Information Communication and Embedded Systems (ICICES), 2014. (2014).

Islam, Md & Rehman, & Syed Ashiqur. (2011). Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches. International Journal of Advanced Science and Technology, 36.

Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. DOI: https://doi.org/10.4108/eai.3-12-2015.2262516

Jayveer Singh, & Manisha J. Nene. (2013). A Survey on Machine Learning Techniques for Intrusion Detection Systems. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 7.

Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752. DOI: https://doi.org/10.1016/j.cose.2020.101752

Kégl, B. (2013). The return of AdaBoost.MH: multi-class Hamming trees. arXiv (Cornell University).

Khan, S., Mast, N., Loo, K., & Silahuddin, A. (2008). Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks.

Koech, K. E. (2023, August 6). Cross-Entropy Loss Function - Towards Data Science. Medium.

Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016a). Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys and Tutorials/IEEE Communications Surveys and Tutorials, 18(1), 184–208.

Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016b). Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys and Tutorials/IEEE Communications Surveys and Tutorials, 18(1), 184–208. DOI: https://doi.org/10.1109/COMST.2015.2402161

Kolias, C., Kolias, V., & Kambourakis, G. (2016). TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. International Journal of Information Security, 16(4), 401–416. DOI: https://doi.org/10.1007/s10207-016-0335-z

Kumar, G., & Alqahtani, H. (2023). Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions. Computer Modeling in Engineering & Sciences, 134(1), 89–119. DOI: https://doi.org/10.32604/cmes.2022.020724

Kumar, Sandeep, & Spafford, Eugene. (1999). A Software Architecture to Support Misuse Intrusion Detection. Purdue University, 17.

L.Dhanabal, & Dr. S.P. Shantharajah. (2015). A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), 7.

Loo, C. E., Ng, M. Y., Leckie, C., & Palaniswami, M. (2006). Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks, 2(4), 313–332. DOI: https://doi.org/10.1080/15501320600692044

Luo, Q., Engineers, I. O. E. a. E., Association, I. I. T. a. R., & Wuhan-Gongcheng-Daxue. (2010). 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA 2010).

Martins, C. (2023, November 2). Gaussian Naive Bayes Explained With Scikit-Learn. Built In.

Mohammadpour, L., Ling, T. C., Liew, C. S., & Aryanfar, A. (2022). A Survey of CNN-Based Network Intrusion Detection. Applied Sciences, 12(16), 8162. DOI: https://doi.org/10.3390/app12168162

Mudzingwa, D., & Agrawal, R. (2012). A study of methodologies used in intrusion detection and prevention systems (IDPS). DOI: https://doi.org/10.1109/SECon.2012.6197080

Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. IEEE Network, 8(3), 26–41. DOI: https://doi.org/10.1109/65.283931

Pushpender Sarao. (2019). Machine Learning and Deep Learning Techniques on Wireless Networks. International Journal of Engineering Research and Technology, 12(3), 10.

Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., & Zebin, T. (2019). An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. DOI: https://doi.org/10.1109/CISS.2019.8693059

Roman, R., Zhou, N. J., & Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks.

Sagers, G. (2021). WPA3: The Greatest Security Protocol That May Never Be. 2021 International Conference on Computational Science and Computational Intelligence (CSCI). DOI: https://doi.org/10.1109/CSCI54926.2021.00273

Shaikh, R. (2018, October 28). Feature Selection Techniques in Machine Learning with Python. Medium.

Sharma, A. (2020, June 10). Understanding Activation Functions in Neural Networks. Medium.

Simon, J., Kapileswar, N., Polasi, P. K., & Elaveini, M. A. (2022). Hybrid intrusion detection system for wireless IoT networks using deep learning algorithm. Computers & Electrical Engineering, 102, 108190. DOI: https://doi.org/10.1016/j.compeleceng.2022.108190

SouravKumarDas. (2020, May 10). Random Forest Classification explained in detail and developed in R. Data Science Central.

T. M. Khoshgoftaar, S. V. Nath, Shi Zhong, & N. Seliya. (2005). Intrusion detection in wireless networks using clustering techniques with expert analysis. Fourth International Conference on Machine Learning and Applications (ICMLA’05), 6. DOI: https://doi.org/10.1109/ICMLA.2005.43

V. Srikanth, & I. Reddy. (2019). Wireless Security Protocols (ITP,WPA,WPA2 & WPA3). International Journal of Scientific Research in Computer Science Engineering and Information Technology.

Wang, S., Li, B., Yang, M., & Yan, Z. (2019a). Intrusion Detection for WiFi Network: A Deep Learning Approach. In Springer eBooks (pp. 95–104).

Wang, S., Li, B., Yang, M., & Yan, Z. (2019b). Intrusion Detection for WiFi Network: A Deep Learning Approach. In Springer eBooks (pp. 95–104). DOI: https://doi.org/10.1007/978-3-030-06158-6_10

Yalin E. Sagduyu, Yi Shi, Tugba Erpek1, William Headley, Bryse Flowers, George Stantchev, & Zhuo Lu. (2020). When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions. arXiv, arXiv:2001.08883v1 [cs.NI] 24 Jan 2020.

Yang, H., & Wang, F. (2019). Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network. IEEE Access, 7, 64366–64374. DOI: https://doi.org/10.1109/ACCESS.2019.2917299

Zamani, M., & Movahedi, M. (2013a, December 8). Machine Learning Techniques for Intrusion Detection.

Zamani, M., & Movahedi, M. (2013b, December 8). Machine Learning Techniques for Intrusion Detection.

Downloads

Published

2024-06-01

Issue

Section

Articles

How to Cite

Muhammad Faseeh Sultan, Sammia Hira, Sohail Masood Bhatti, & Allah Rakha. (2024). Analysis of Machine Learning Methods for Intrusion Detection Systems in Wireless Networks. Bulletin of Business and Economics (BBE), 13(2), 391-403. https://doi.org/10.61506/01.00343