scispace - formally typeset
Search or ask a question
Author

Dilip Kumar Barman

Bio: Dilip Kumar Barman is an academic researcher. The author has contributed to research in topics: Password & Intrusion detection system. The author has co-authored 1 publications.

Papers
More filters
Proceedings ArticleDOI
01 Apr 2018
TL;DR: A major problem for networked systems is hostile trespassers, which means users or software used by users to trespass a network and the need to detect the intrusions or intended intrusions as absolute security may not be possible.
Abstract: A major problem for networked systems is hostile trespassers. These trespassers may be users or software used by users to trespass a network. Trespasses may be in the form of authorized logon to a machine or acquisition of privileges and performance of actions beyond that have been authorized when in the case of an authorized user. To protect these resources, we need to detect the intrusions or intended intrusions, as absolute security may not be possible. Automatic detection of attacks [1] requires some kind of machine learning approach for the detection purposes. For machine learning to be successful, the machines have to be trained for known types of attacks.

2 citations


Cited by
More filters
Proceedings ArticleDOI
04 Dec 2022
TL;DR: In this article , the authors proposed a two-stage solution for detecting an intrusion in the network using a Machine Learning (ML) based solution, and achieved over 99% accuracy in attack detection using a machine learning based solution.
Abstract: With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, the WiFi Protected Access 3 (WPA3) was introduced to fix the most common security flaws. Although WPA3 is an improvement over its predecessor in terms of security, recently, it was found that WPA3 has a few security vulnerabilities as well. In this paper, we have mentioned the previously known vulnerabilities in WPA3 and WPA2. In addition, we have created our dataset based on WPA3 attacks. We have proposed a two-stage solution for detecting an intrusion in the network. The two-stage approach will help ease the computational processing burden of an AP and WLAN Controller. First, Access Point (AP) will perform a lightweight, simple operation for some duration (say 500ms) at a particular time interval. Upon discovering any abnormality in the flow of traffic, an ML-based solution at the controller will detect the type of attack. Our approach is to utilize resources on AP and the back-end controller with a certain optimization level. We have achieved over 99% accuracy in attack detection using a Machine Learning (ML) based solution. We have also publicly provided our code and dataset for the open-source research community so that it can contribute to future research work.
Proceedings ArticleDOI
06 Jul 2022
TL;DR: A two-stage solution for the detection of an intrusion in the network is proposed and over 99% accuracy in attack detection using an ML-based solution is achieved.
Abstract: With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, the WiFi Protected Access 3 (WPA3) was introduced to fix the most common security flaws. Although WPA3 is an improvement over its predecessor in terms of security, recently, it was found that WPA3 has a few security vulnerabilities as well. In this paper, we have mentioned the previously known vulnerabilities in WPA3 and WPA2. In addition, we have created our dataset based on WPA3 attacks. We have proposed a two-stage solution for detecting an intrusion in the network. The two-stage approach will help ease the computational processing burden of an AP and WLAN Controller. First, Access Point (AP) will perform a lightweight, simple operation for some duration (say 500ms) at a particular time interval. Upon discovering any abnormality in the flow of traffic, an ML-based solution at the controller will detect the type of attack. Our approach is to utilize resources on AP and the back-end controller with a certain optimization level. We have achieved over 99% accuracy in attack detection using a Machine Learning (ML) based solution. We have also publicly provided our code and dataset for the open-source research community so that it can contribute to future research work.