Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection

被引:3
|
作者
El-Alfy, El-Sayed M. [1 ]
Al-Obeidat, Feras N. [2 ]
机构
[1] King Fahd Univ Petr & Minerals, Coll Comp Sci & Engn, Dhahran 31261, Saudi Arabia
[2] IBM Res & Dev Ctr, Markham, ON L3R 9Z7, Canada
关键词
INTRUSION DETECTION;
D O I
10.1155/2015/585432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range of exploitable vulnerabilities emerges due to the use of multivendor and multidomain cross-network services for signaling and transport of Internet-and wireless-based data. Consequently, the rates and types of cyber-attacks have grown considerably and current security countermeasures for protecting information and communication may be no longer sufficient. In this paper, we investigate a novel methodology based on multicriterion decision making and fuzzy classification that can provide a viable second-line of defense for mitigating cyber-attacks. The proposed approach has the advantage of dealing with various types and sizes of attributes related to network traffic such as basic packet headers, content, and time. To increase the effectiveness and construct optimal models, we augmented the proposed approach with a genetic attribute selection strategy. This allows efficient and simpler models which can be replicated at various network components to cooperatively detect and report malicious behaviors. Using three datasets covering a variety of network attacks, the performance enhancements due to the proposed approach are manifested in terms of detection errors and model construction times.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Multiattribute Access Selection Algorithm for Heterogeneous Wireless Networks Based on Fuzzy Network Attribute Values
    Guo, Xiaoxue
    Omar, Mohd Hasbullah
    Zaini, Khuzairi Mohd
    Liang, Gen
    Lin, Maoyuan
    Gan, Zirun
    [J]. IEEE ACCESS, 2022, 10 : 74071 - 74081
  • [42] Using attribute grammars for the genetic selection of backpropagation networks for character recognition
    Browse, RA
    Hussain, TS
    Smillie, MB
    [J]. APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN IMAGE PROCESSING IV, 1999, 3647 : 26 - 34
  • [43] Detection of Cyber-Attacks and Power Disturbances in Smart Digital Substations using Continuous Wavelet Transform and Convolution Neural Networks
    Nassar, Abu
    Morsi, W. G.
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2024, 229
  • [44] An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
    Saharkhizan, Mahdis
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8852 - 8859
  • [45] Detection of Attacks on Wireless Sensor Network Using Genetic Algorithms Based on Fuzzy
    Al Hayali, Shaymaa
    Ucan, Osman
    Rahebi, Javad
    Bayat, Oguz
    [J]. INTERNATIONAL JOURNAL OF RENEWABLE ENERGY DEVELOPMENT-IJRED, 2019, 8 (01): : 57 - 64
  • [46] An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks
    [J]. 2017, Institute of Electrical and Electronics Engineers Inc., United States (00):
  • [47] An Efficient Fuzzy Path Selection Approach to Mitigate Selective Forwarding Attacks in Wireless Sensor Networks
    Sert, Seyyit Alper
    Fung, Carol
    George, Roy
    Yazici, Adnan
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2017,
  • [48] Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
    Zanna, Paul
    Radcliffe, Peter
    Kumar, Dinesh
    [J]. SENSORS, 2022, 22 (23)
  • [49] Detecting selective forwarding attacks in Wireless Sensor Networks using Support Vector Machines
    Kaplantzis, Sophia
    Shilton, Alistair
    Mani, Nallasamy
    Sekercioglu, Y. Ahmet
    [J]. PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 335 - +
  • [50] Detecting Location-Based Attacks in Wireless Sensor Networks Using Sequential Analysis
    Potukuchi, Raghu Vamsi
    Kant, Krishna
    [J]. IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 541 - 551