Open AccessOpen Access


Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

1 Faculty of Engineering, Future University, Khartoum 10553, Sudan
2 Faculty of Computing and Informatics, Universiti Malaysia Sabah, Kota Kinabalu, 88400, Malaysia
3 Information Assurance and Security Research, School of Computing, Universiti Teknologi Malaysia, Johor, 81310, Malaysia
4 School of Psychology and Computer Science, University of Central Lancashire, Preston PR1 2HE, UK
5 Deaptement of Management Information Systems, College of Administrative Science, Applied Science University, Al Eker, 623, Bahrain
6 Deaptement of Information Technology, College of Computer and Information Sciences, King Saud University, Riyadh, 11461, Saudi Arabia

* Corresponding Author: Muzaffar Hamzah. Email:

Computers, Materials & Continua 2023, 74(3), 5607-5623.


IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to overcome many wireless network attacks, effectively detecting such attacks is crucial in today’s real-world applications. This paper presents a novel resource exhaustion attack detection scheme (READS) to detect resource exhaustion attacks effectively. The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack. The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in the WLAN. The proposed scheme consists of four modules which make it capable to alleviates the attack impact more effectively than the related work. The experimental results show the effectiveness of the proposed technique by gaining an 89.11% improvement compared to the existing works in terms of detection.


Cite This Article

A. E. Abdallah, M. Hamdan, S. A. Razak, F. A. Ghalib, M. Hamzah et al., "Resource exhaustion attack detection scheme for wlan using artificial neural network," Computers, Materials & Continua, vol. 74, no.3, pp. 5607–5623, 2023.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 258


  • 99


  • 0


Share Link

WeChat scan