Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks
Abstract
:1. Introduction
- -
- Radiation power parameters are selected. The system of wireless sensors using the triangulation method for their measurement and data acquisition is experimentally implemented. Data acquisition is carried out for a sufficiently long time. The collected data are taken as those characterizing the system normal functioning.
- -
- The collected data are supplemented with all possible values of the range using a special generation algorithm. The generated data are taken as characterizing the appearance of an illegitimate access point, that is, the implementation of the Evil Twin attack.
- -
- Training of the intrusion detection system is carried out on the complete set of data using the KNN method.
- -
- An experimental simulation of the Evil Twin attack is carried out. The intrusion detection system recognizes the attack. Intrusion detection quality characteristics are calculated.
2. Materials and Methods
2.1. Location of the Study
2.2. Hardware and Software
Algorithm 1. Generate the array of all possible signal strength ranges. | |
1: | Input: empty array R, step for feature average avgstep |
2: | for min = −100 to 0 do |
3: | min = min + 1 |
4: | for max = min to 0 do |
5: | max = max + 1 |
6: | for mode = min to max do |
7: | mode = mode + 1 |
8: | for avg = min to max do |
9: | avg = avg + avgstep |
10: | * Append {min, max, avg, mode} into list R |
11: | end for |
12: | end for |
13: | end for |
14: | end for |
15: | Output: Array with values R |
3. Results
3.1. Data Extraction
3.2. Data Analysis
3.3. Model Training
4. Discussion
4.1. Comparison of the Model’s Prediction with the Signature
4.2. Prediction Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Vanhoef, M.; Ronen, E. Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. In Proceedings of the 41st IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 18–21 May 2020. [Google Scholar] [CrossRef]
- Sikora, A.; Nyemkova, E.; Lakh, Y. Accuracy Improvements of Identification and Authentication of Devices by EM-Measurements. In Proceedings of the 5th IEEE International Symposium on Smart and Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems, Dortmund, Germany, 17–18 September 2020. [Google Scholar] [CrossRef]
- Yang, C.; Sample, A.P. EM-ID: Tag-less Identification of Electrical Devices via Electromagnetic Emissions. In Proceedings of the 2016 IEEE International Conference on RFID, Orlando, FL, USA, 3–5 May 2016. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, Y.; Zhang, H.; Wei, X.; Wang, G. Identification and Authentication for Wireless Transmission Security Based on RF-DNA Fingerprint. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 230. [Google Scholar] [CrossRef]
- Chen, S.; Xie, F.; Chen, Y.; Song, H.; Wen, H. Identification of Wireless Transceiver Devices Using Radio Frequency (RF) Fingerprinting Based on STFT Analysis to Enhance Authentication Security. In Proceedings of the IEEE International Symposium on Electromagnetic Compatibility, Beijing, China, 28–31 October 2017. [Google Scholar] [CrossRef]
- Fadul, M.K.M.; Reising, D.R.; Loveless, T.D.; Ofoli, A.R. RF-DNA Fingerprint Classification of OFDM Signals Using a Rayleigh Fading Channel Model. In Proceedings of the Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019. [Google Scholar] [CrossRef]
- Bihl, T.J.; Bauer, K.W.; Temple, M.A. Feature Selection for RF Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1862–1874. [Google Scholar] [CrossRef]
- Forbes, G.; Massie, S.; Craw, S. Wifi-based human activity recognition using Raspberry Pi. In Proceedings of the 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence, Baltimore, MD, USA, 9–11 November 2020; Alamaniotis, M., Pan, S., Eds.; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar] [CrossRef]
- Jukić, D.; Domazet, S.; Ivanko, A.; Raca, D.; Nikolić, S.; Knežević, M.; Jović, F.; Raca, N.; Buljan, H. Determining the presence and the number of people by using a Wi-Fi signal. Electr. Eng. Syst. Sci. Signal Process. 2023, arXiv:2308.06773v1. [Google Scholar] [CrossRef]
- AlQahtani, A.A.S.; Alshayeb, T. Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning. Comput. Sci. Cryptogr. Secur. 2023, arXiv:2303.02503v1. [Google Scholar] [CrossRef]
- AlQahtani, A.A.S.; Alshayeb, T.; Nabil, M.; Patooghy, A. Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication. Comput. Sci. Cryptogr. Secur. 2024, arXiv:2401.06612v1. [Google Scholar] [CrossRef]
- Banakh, R.; Piskozub, A.; Opirskyy, I. Detection of MAC spoofing attacks in IEEE 802.11 networks using signal strength from attackers’ devices. Adv. Intell. Syst. Comput. 2019, 754, 468–477. [Google Scholar] [CrossRef]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutor. 2015, 18, 184–208. [Google Scholar] [CrossRef]
- Sarker, I.H. Machine Learning: Algorithms, Real-World Applications and Research Directions. SN Comput. Sci. 2021, 2, 160. [Google Scholar] [CrossRef] [PubMed]
- Sony, S. Preprint: Towards Multiclass Damage Detection and Localization using Limited Vibration Measurements. Ph.D. Thesis, University of Western Ontario, London, ON, Canada, 2021. [Google Scholar] [CrossRef]
- Uddin, S.; Haque, I.; Lu, H.; Ali Moni, M.; Gide, E. Comparative Performance Analysis of K-Nearest Neighbour (KNN) Algorithm and its Different Variants for Disease Prediction. Sci. Rep. 2022, 12, 6256. [Google Scholar] [CrossRef] [PubMed]
- Taunk, K.; De, S.; Verma, S.; Swetapadma, A. A Brief Review of Nearest Neighbor Algorithm for Learning and Classification. In Proceedings of the 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, 15–17 May 2019. [Google Scholar] [CrossRef]
- Banakh, R.; Piskozub, A.; Opirskyy, I. Devising a method for detecting “evil twin” attacks on IEEE 802.11 networks (WI-FI) with KNN classification model. East.-Eur. J. Enterp. Technol. 2023, 3, 20–32. [Google Scholar] [CrossRef]
- Alotaibi, B.; Elleithy, K. A New MAC Address Spoofing Detection Technique Based on Random Forests. Sensors 2016, 16, 281. [Google Scholar] [CrossRef] [PubMed]
- Banakh, R.; Piskozub, A.; Stefinko, Y. External elements of honeypot for wireless network. In Proceedings of the 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, Ukraine, 23–26 February 2016. [Google Scholar] [CrossRef]
- UniFi, Access Point AC Long-Range. Available online: https://store.ui.com/us/en/products/unifi-ac-lr (accessed on 6 July 2024).
- Raspberry Pi 4 Model, B. Available online: https://www.raspberrypi.com/products/raspberry-pi-4-model-b/ (accessed on 6 July 2024).
- Library Scapy. Available online: https://scapy.net/ (accessed on 6 July 2024).
- AWUS036AXM Alfa Networks Inc. Available online: https://www.alfa.com.tw/products/awus036axm?variant=39913640198216 (accessed on 6 July 2024).
- Aircrack-ng. FAQ. What Is the Best Wireless Card to Buy. Available online: https://www.aircrack-ng.org/doku.php?id=faq#what_is_the_best_wireless_card_to_buy (accessed on 6 July 2024).
- Database InfluxDB. Available online: https://www.influxdata.com/ (accessed on 6 July 2024).
- Kapgate, Y.; Vatti, R.; Jadhav, S. WiFi Tools and Signal Strength Analysis. GRD J. Glob. Res. Dev. J. Eng. 2017, 2, 17–21. [Google Scholar]
- Syafrizal, N.; Pontia, F.; Tjahjamooniarsih, N. Analysis of Wi-Fi Network Quality in Tanjungpura University Library Building. Telecommun. Comput. Electr. Eng. J. 2023, 1, 13–22. [Google Scholar] [CrossRef]
- Project Jupyter. Available online: https://jupyter.org/ (accessed on 6 July 2024).
- Library Python Data Analysis (Pandas). Available online: https://pandas.pydata.org/ (accessed on 6 July 2024).
- Mladenova, T.; Valova, I. Analysis of the KNN Classifier Distance Metrics for Bulgarian Fake News Detection. In Proceedings of the 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, 11–13 June 2021. [Google Scholar] [CrossRef]
- Sckit Learn, API Reference, GridSearchCV. Available online: https://scikit-learn.org/dev/modules/generated/sklearn.model_selection.GridSearchCV.html (accessed on 6 October 2024).
- Lopez-Bernal, D.; Balderas, D.; Ponce, P.; Molina, A. Education 4.0: Teaching the Basics of KNN, LDA and Simple Perceptron Algorithms for Binary Classification Problems. Future Internet 2021, 13, 193. [Google Scholar] [CrossRef]
- Sckit Learn, API Reference, KNeighborsClassifier. Available online: https://scikit-learn.org/stable/modules/generated/sklearn.neighbors.KNeighborsClassifier.html (accessed on 6 July 2024).
- Thankappan, M.; Rifa-Pous, H.; Garrigues, C. A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. IEEE Access 2024, 12, 23096–23121. [Google Scholar] [CrossRef]
Sensor’s id | Sensor 1 | Sensor 2 | Sensor 3 | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Timestamp | min | max | avg | mode | min | max | avg | mode | min | max | avg | mode |
0 | −36 | −28 | −31.1 | −31 | −49 | −45 | −47.86 | −48 | −52 | −46 | −47.95 | −48 |
1 | −64 | −28 | −33.97 | −31 | −68 | −45 | −50.63 | −48 | −53 | −46 | −48.53 | −48 |
2 | −66 | −28 | −46.76 | −31 | −67 | −45 | −56.51 | −48 | −54 | −46 | −49.42 | −48 |
3 | −65 | −28 | −46.44 | −31 | −69 | −45 | −56.7 | −48 | −56 | −46 | −49.19 | −48 |
4 | −65 | −28 | −46.14 | −31 | −68 | −45 | −56.44 | −48 | −53 | −45 | −49.4 | −48 |
5 | −62 | −28 | −32 | −31 | −53 | −45 | −47.84 | −48 | −49 | −46 | −47.97 | −48 |
Skipped | ||||||||||||
25 | −61 | −28 | −35.17 | −31 | −70 | −42 | −50.36 | −48 | −64 | −32 | −47.96 | −48 |
26 | −54 | −28 | −36.79 | −31 | −58 | −43 | −49.9 | −48 | −59 | −35 | −46.02 | −48 |
27 | −54 | −9 | −26.97 | −31 | −57 | −35 | −45.96 | −47 | −55 | −27 | −43.68 | −48 |
28 | −34 | −9 | −21.59 | −12 | −47 | −41 | −45.04 | −47 | −49 | −37 | −43.69 | −40 |
29 | −33 | −9 | −21.61 | −12 | −51 | −41 | −45.14 | −47 | −53 | −37 | −43.73 | −40 |
30 | −32 | −10 | −21.84 | −12 | −53 | −34 | −45.17 | −47 | −51 | −28 | −43.4 | −40 |
Skipped | ||||||||||||
59 | −35 | −29 | −31.22 | −31 | −51 | −45 | −47.9 | −48 | −50 | −46 | −47.9 | −48 |
60 | −25 | −28 | −31.05 | −31 | −53 | −45 | −47.92 | −48 | −52 | −46 | −47.9 | −48 |
61 | −52 | −29 | −33.34 | −31 | −66 | −45 | −50.5 | −48 | −64 | −46 | −50.42 | −48 |
62 | −39 | −28 | −33.92 | −31 | −55 | −45 | −49.75 | −47 | −64 | −45 | −54.25 | −61 |
63 | −39 | −28 | −34 | −37 | −54 | −45 | −49.8 | −47 | −63 | −45 | −54.53 | −61 |
64 | −41 | −28 | −33.95 | −37 | −56 | −45 | −49.78 | −47 | −63 | −45 | −54.42 | −61 |
65 | −38 | −27 | −33.9 | −37 | −55 | −45 | −49.84 | −47 | −62 | −45 | −54.36 | −61 |
66 | −40 | −28 | −33.98 | −31 | −55 | −45 | −49.76 | −47 | −62 | −45 | −54.34 | −61 |
67 | −39 | −28 | −33.96 | −37 | −55 | −45 | −49.76 | −47 | −62 | −45 | −54.49 | −47 |
68 | −40 | −28 | −33.98 | −37 | −56 | −46 | −49.47 | −47 | −62 | −45 | −54.47 | −47 |
69 | −40 | −28 | −33.96 | −31 | −54 | −46 | −49.74 | −47 | −63 | −45 | −54.44 | −47 |
70 | −69 | −28 | −39.5 | −31 | −75 | −47 | −54.4 | −48 | −70 | −45 | −54.18 | −48 |
71 | −63 | −28 | −44.75 | −31 | −71 | −46 | −57.58 | −48 | −60 | −46 | −52.41 | −48 |
Skipped | ||||||||||||
77 | −62 | −28 | −44.33 | −31 | −71 | −45 | −57.38 | −48 | −69 | −46 | −55.8 | −48 |
78 | −67 | −28 | −43.71 | −31 | −74 | −45 | −55.12 | −48 | −67 | −45 | −53.01 | −48 |
79 | −55 | −28 | −35.81 | −31 | −60 | −45 | −49.94 | −48 | −57 | −45 | −49.3 | −48 |
80 | −34 | −28 | −31.01 | −31 | −50 | −45 | −47.87 | −48 | −53 | −45 | −47.86 | −48 |
81 | −35 | −28 | −31.16 | −31 | −52 | −45 | −47.88 | −48 | −52 | −46 | −47.94 | −48 |
82 | −35 | −28 | −31.16 | −31 | −48 | −45 | −47.89 | −48 | −53 | −45 | −47.91 | −48 |
83 | −35 | −28 | −31.15 | −31 | −52 | −46 | −47.89 | −48 | −53 | −45 | −47.88 | −48 |
84 | −34 | −28 | −31.19 | −31 | −52 | −45 | −47.89 | −48 | −52 | −46 | −47.88 | −48 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Banakh, R.; Nyemkova, E.; Justice, C.; Piskozub, A.; Lakh, Y. Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks. Data 2024, 9, 119. https://doi.org/10.3390/data9100119
Banakh R, Nyemkova E, Justice C, Piskozub A, Lakh Y. Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks. Data. 2024; 9(10):119. https://doi.org/10.3390/data9100119
Chicago/Turabian StyleBanakh, Roman, Elena Nyemkova, Connie Justice, Andrian Piskozub, and Yuriy Lakh. 2024. "Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks" Data 9, no. 10: 119. https://doi.org/10.3390/data9100119
APA StyleBanakh, R., Nyemkova, E., Justice, C., Piskozub, A., & Lakh, Y. (2024). Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks. Data, 9(10), 119. https://doi.org/10.3390/data9100119