Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

MFST-DAD system model.

More »

Fig 1 Expand

Fig 2.

MFST-DAD design architecture.

More »

Fig 2 Expand

Fig 3.

Experimental setup.

More »

Fig 3 Expand

Fig 4.

Analysis of frame types and their frequency of occurrence.

More »

Fig 4 Expand

Fig 5.

Analysis of time gaps between Wi-Fi packets.

More »

Fig 5 Expand

Fig 6.

Entropy results analysis of MFST-DAD with (a) WPA3-SAE and (b) WPA3-TM.

More »

Fig 6 Expand

Fig 7.

Entropy results analysis of MFST-DAD via temporary condition.

More »

Fig 7 Expand

Fig 8.

Response of MFST-DAD’s RDP algorithm to data captured from (a) WPA3-SAE only and (b) WPA3-TM attack scenarios.

More »

Fig 8 Expand

Fig 9.

Real-time prevention response of MFST-DAD with adaptive blacklist mechanism.

More »

Fig 9 Expand

Fig 10.

Confusion matrix of the Naive Bayes classifier used in MFST-DAD.

More »

Fig 10 Expand

Table 1.

Evaluation results of ML-based classifier within MFST-DAD framework.

More »

Table 1 Expand

Table 2.

Benchmarking with state-of-the-art related works.

More »

Table 2 Expand