LUO Shangping. Intrusion detection system for denial of service attack in MAC layer[J]. Journal of Mine Automation, 2014, 40(8): 67-71. DOI: 10.13272/j.issn.1671-251x.2014.08.017
Citation: LUO Shangping. Intrusion detection system for denial of service attack in MAC layer[J]. Journal of Mine Automation, 2014, 40(8): 67-71. DOI: 10.13272/j.issn.1671-251x.2014.08.017

Intrusion detection system for denial of service attack in MAC layer

More Information
  • For insufficient of safety protection means and characteristics of denial of service attack in MAC layer of WLAN, the paper designed an intrusion detection system based on support vector machine. The system uses characteristics of high classification accuracy of support vector machine to build hyper-plane of optimal classification and classification decision function, and achieves classification and identification of network traffic, and completes detection of abnormal traffic. The intrusion detection of WLAN was simulated on OPNET platform, and the result indicates that the system can detect denial of service attack in MAC layer efficiently.
  • Related Articles

    [1]LI Tieniu, HU Binxin, LI Huakun, GENG Wencheng, HAO Pengcheng, JI Xubo, SUN Zengrong, ZHU Feng, ZHANG Hua, YANG Chengquan. Automatic picking method of microseismic first arrival time based on improved support vector machine[J]. Journal of Mine Automation, 2023, 49(3): 63-69. DOI: 10.13272/j.issn.1671-251x.2022050081
    [2]ZHAO Bilong, QIAO Tiezhu. Detection method of belt longitudinal tear based on support vector machine and infrared image segmentation[J]. Journal of Mine Automation, 2014, 40(5): 30-33. DOI: 10.13272/j.issn.1671-251x.2014.05.008
    [3]NIU Chao, YAO Yu-mei. Research of Adaptive Backstepping Control of Crane Hoisting System[J]. Journal of Mine Automation, 2011, 37(9): 67-71.
    [4]WANG Yong-chao, SUN Huai-xiang. Application of Access and MCGS in Loading System of Main Shaft[J]. Journal of Mine Automation, 2010, 36(5): 94-97.
    [5]ZHOU Xin, MIAO Chang-yun, LI Yan-feng, WU Zhi-gang. Optimization of CS-ACELP Voice Code Algorithm and Its Implementation on DSP[J]. Journal of Mine Automation, 2009, 35(12): 69-72.
    [6]TANG Xiao-yan~(, 2). Comparison and Application Analysis of ICE and CORBA[J]. Journal of Mine Automation, 2008, 34(4): 139-142.
    [7]CAO Wen, SUN Wei, ZHAO Hui. Application Based on Ethernet of Microsoft Office Access in Query System of RSView Report Formas[J]. Journal of Mine Automation, 2007, 33(5): 123-124.
    [8]LIU Tong-hua, ZHANG Jian-ying, MIN Qian-yong, CHEN Guang-pu. Research of Using Web Service as Plug-in Unit of Application Program and Its Applicatio[J]. Journal of Mine Automation, 2007, 33(4): 92-94.
    [10]SONG Zheng-li. The Mode of Computing Meshes of Mine Safety Based on Web Service[J]. Journal of Mine Automation, 2005, 31(5): 63-65.

Catalog

    LUO Shangping

    1. On this Site
    2. On Google Scholar
    3. On PubMed

    Article Metrics

    Article views (44) PDF downloads (9) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return