Nashmia Khalid
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks
Khalid, Nashmia; Hina, Sadaf; Khurram, Shabih; Zaidi; Gaber, Tarek; Speakman, Lee; Noor, Zainab
Authors
Dr Sadaf Hina S.Hina@salford.ac.uk
Lecturer in Cyber Security
Shabih Khurram
Zaidi
Tarek Gaber
Dr Lee Speakman L.Speakman@salford.ac.uk
Lecturer in Cyber Security
Zainab Noor
Contributors
Muhammad Saadi
Editor
Abstract
The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to cyberattacks and it is a significant concern. Existing research in Wi-Fi attack detection focused on obtaining high detection accuracy while neglecting modern traffic and attack scenarios such as key reinstallation or unauthorized decryption attacks. This study proposed a novel approach using the AWID 3 dataset for cyberattack detection. The retained features were analyzed to assess their transferability, creating a lightweight and cost-effective model. A decision tree with a recursive feature elimination method was implemented for the extraction of the reduced features subset, and an additional feature wlan_radio.signal_dbm was used in combination with the extracted feature subset. Several deep learning and machine learning models were implemented, where DT and CNN achieved promising classification results. Further, feature transferability and generalizability were evaluated, and their detection performance was analyzed across different network versions where CNN outperformed other classification models. The practical implications of this research are crucial for the secure automation of wireless intrusion detection frameworks and tools in personal and enterprise paradigms.
Journal Article Type | Article |
---|---|
Acceptance Date | Jun 21, 2024 |
Online Publication Date | Jan 2, 2025 |
Deposit Date | Nov 19, 2024 |
Publicly Available Date | Jan 2, 2025 |
Journal | PLOS ONE |
Electronic ISSN | 1932-6203 |
Publisher | Public Library of Science |
Peer Reviewed | Peer Reviewed |
Volume | 20 |
Issue | 1 |
Pages | e0306747 |
DOI | https://doi.org/10.1371/journal.pone.0306747 |
Keywords | Feature Transferability, Wireless Communication; Authentication Attacks; Unauthorized Decryption; Machine Learning |
Files
Accepted Version
(689 Kb)
PDF
You might also like
Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction
(2009)
Journal Article
Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
(2024)
Presentation / Conference Contribution
An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact
(2008)
Presentation / Conference Contribution
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond
(2018)
Presentation / Conference Contribution
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search