Intrusion Detection for WiFi Network: A Deep Learning Approach

  • Shaoqian Wang
  • Bo Li
  • Mao YangEmail author
  • Zhongjiang Yan
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 264)


With the popularity and development of Wi-Fi network, network security has become a key concern in the recent years. The amount of network attacks and intrusion activities are growing rapidly. Therefore, the continuous improvement of Intrusion Detection Systems (IDS) is necessary. In this paper, we analyse different types of network attacks in wireless networks and utilize Stacked Autoencoder (SAE) and Deep Neural Network (DNN) to perform network attack classification. We evaluate our method on the Aegean WiFi Intrusion Dataset (AWID) and preprocess the dataset by feature selection. In our experiments, we classified the network records into 4 types: normal record, injection attack, impersonation attack and flooding attack. The classification accuracies we achieved of these 4 types of records are 98.4619\(\%\), 99.9940\(\%\), 98.3936\(\%\) and 73.1200\(\%\), respectively.


Wi-fi network Network intrusion detection Deep learning 



This work was supported in part by the National Natural Science Foundations of CHINA (Grant No. 61771390, No. 61501373, No. 61771392, and No. 61271279), the National Science and Technology Major Project (Grant No. 2016ZX03001018-004, and No. 2015ZX03002006-004), the Fundamental Research Funds for the Central Universities (Grant No. 3102017ZY018), and the Science and Technology on Communication Networks Laboratory Open Projects (Grant No. KX172600027).


  1. 1.
    KDDCUP99, Kdd cup99 data set (1999). Accessed 15 Jan 2018
  2. 2.
    NSL-KDD, NSL-KDD data set for network-based intrusion detection systems (2009). Accessed 15 Jan 2018
  3. 3.
    Kolias, C., Kambourakis, G., Stavrou, A., et al.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset [J]. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2016)Google Scholar
  4. 4.
    Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., et al.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection [J]. IEEE Trans. Inf. Forensics Secur. PP(99), 1–1 (2018)Google Scholar
  5. 5.
    Aminanto, M.E., Tanuwidjaja, H.C., Yoo, P.D., et al.: Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier [C]. In: International Workshop on Big Data and Information Security, pp. 99–104 (2018)Google Scholar
  6. 6.
    Aminanto, M.E., Kim, K.: Detecting impersonation attack in WiFi networks using deep learning approach. In: Choi, D., Guilley, S. (eds.) WISA 2016. LNCS, vol. 10144, pp. 136–147. Springer, Cham (2017). Scholar
  7. 7.
    Thing, V.L.L.: IEEE 802.11 network anomaly detection and attack classification: a deep learning approach [C]. In: Wireless Communications and Networking Conference, pp. 1–6. IEEE (2017)Google Scholar
  8. 8.
    He, K., Zhang, X., Ren, S., et al.: Delving deep into rectifiers: surpassing human-level performance on ImageNet classification [J]. pp. 1026–1034 (2015)Google Scholar
  9. 9.
    Larose, D.T.: Data Preprocessing, Discovering Knowledge in Data: An Introduction to Data Mining, pp. 27–40. Wiley (2014)Google Scholar
  10. 10.
    Srivastava, N., Hinton, G., Krizhevsky, A., et al.: Dropout: a simple way to prevent neural networks from overfitting [J]. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)MathSciNetzbMATHGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Shaoqian Wang
    • 1
    • 2
  • Bo Li
    • 1
  • Mao Yang
    • 1
    Email author
  • Zhongjiang Yan
    • 1
  1. 1.School of Electronics and InformationNorthwestern Polytechnical UniversityXi’anChina
  2. 2.Science and Technology on Communication Networks LaboratoryShijiazhuangChina

Personalised recommendations