Abstract
Genetic Programming (GP) based Intrusion Detection
Systems (IDS) use connection state network data during
their training phase. These connection states are
recorded as a set of features that the GP uses to train
and test solutions which allow for the efficient and
accurate detection of given attack patterns. However,
when applied to a 802.11 network that is faced with
attacks specific to the 802.11 protocol, the GP's
detection rate reduces dramatically. We discuss what
causes this effect, and what can be done to improve
GP's performance on 802.11 networks.
Users
Please
log in to take part in the discussion (add own reviews or comments).