Journal of Jilin University Science Edition

Previous Articles     Next Articles

Construction Method and Realization of Datasetsunder Wireless Network WEP Attack

ZHANG Chen1, HU Liang1, Nurbol2   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;2. College of Information Science and Engineering, Xinjiang University, Urumqi 830046, China
  • Received:2013-07-11 Online:2014-01-26 Published:2014-03-05
  • Contact: HU Liang E-mail:hul@mail.jlu.edu.cn

Abstract:

The authors deeply researched into wireless security vulnerability of WEP (wired equivalent privacy) protocol and the generation of attack characteristics in the KDD99 attack dataset. Using the artificial WEP protocol attack experiment in the wireless environment and the feature selection algorithm, we fully achieved the collection of the WEP attack data and its features extraction, and furthermore built an attack dataset under the WEP protocol. This method for dataset construction of multiple attack types in wireless network has a certain degree of significance.

Key words: wireless networks, WEP protocol, WEP attack; data acquisition

CLC Number: 

  • TP391