2021
DOI: 10.1109/access.2021.3061609
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 57 publications
(42 citation statements)
references
References 15 publications
1
41
0
Order By: Relevance
“…The Tofino switch uses a snake configuration for throughput tests. More details in Appendix D. Workloads: Our evaluation explores four use cases: attack detection (using AWID3 [8], CICIDS 2017 [52], KDD99 [58], and UNSW-NB15 [42]), finance (NASDAQ TotalView-ITCH [47], Jane Street Market Prediction [21]), QoE (Requet [24]) and flowers classification (Iris [17]). The results for attack detection (using CICIDS and UNSW) and finance are presented below, and the rest are described in appendix E.3.…”
Section: Methodology and Testbed Setupmentioning
confidence: 99%
“…The Tofino switch uses a snake configuration for throughput tests. More details in Appendix D. Workloads: Our evaluation explores four use cases: attack detection (using AWID3 [8], CICIDS 2017 [52], KDD99 [58], and UNSW-NB15 [42]), finance (NASDAQ TotalView-ITCH [47], Jane Street Market Prediction [21]), QoE (Requet [24]) and flowers classification (Iris [17]). The results for attack detection (using CICIDS and UNSW) and finance are presented below, and the rest are described in appendix E.3.…”
Section: Methodology and Testbed Setupmentioning
confidence: 99%
“…Multiple Flow Derived Features (MFD) correspond to the aggregation of information belonging to multiple flow records, containing higher level statistics (e.g., time window delimited flows, last n flows and so on). Finally, dataset labeling could be done manually (M) by a skillful professional; automatically (A) using a rule repository and a script; or on a scheduled (S) way, [20] wireless IoT 2020 IOT-23 [21] A IoT 2020 TON IOT [22] A IoT/IIoT 2019 CICIDS-2017 [23] S application traffic 2017 ISCXTor2016 [24] S application traffic (raw/Tor) 2016 ISCXVPN2016 [25] S application traffic (raw/VPN) 2016 WSN-DS [26] S wireless IoT 2016 AWID2 [27] M wireless IoT 2015 SEA [28] A UNIX commands 2001 NSL-KDD [29] MS networking 1998 1 M: manually, A: automatically, S: scheduled. launching specific attacks in pre-established time windows.…”
Section: B Datasets For Evaluating Idsmentioning
confidence: 99%
“…Regarding the monitored devices, datasets [21], [22] collect data from IoT devices using the Zeek "Bro" network security monitoring tool. Similarly, datasets [20], [26], [27] capture specific data coming from wireless IoT parties. The generalized use of DARPA type datasets [30] (i.e., storing and inferring new instances from the information exchange of multiple agents) and its derivatives (e.g., [29]) are also present in Table I.…”
Section: B Datasets For Evaluating Idsmentioning
confidence: 99%
“…The respective contemporary AP models were ASUS RT-AX88U, DIR-X1860, MR7350, AX1800, RAX40, and AX10v1, respectively. Excluding legacy or common Wi-Fi vulnerabilities [36][37][38], for such devices, an essential concern is the protection of the Wi-Fi passphrase, i.e., the key(s) to connect to the Wi-Fi network. Another major concern is the safeguarding of the user credentials used to connect to the AP's web-based management interface.…”
Section: Access Pointsmentioning
confidence: 99%