Anomaly-based intrusion detection using mobility profiles of public transportation users

被引:0
|
作者
Hall, J [1 ]
Barbeau, M [1 ]
Kranakis, E [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
mobile networking; security; intrusion detection; IBL; and mobility profiles;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For the purpose of anomaly-based intrusion detection in mobile networks, the utilization of profiles, based on hardware signatures, calling patterns, service usage, and mobility patterns, have been explored by various research teams and commercial systems, namely the Fraud Management System by Hewlett-Packard and Compaq. This paper examines the feasibility of using profiles, which are based on the mobility patterns of mobile users, who make use of public transportation, e.g. bus. More specifically, a novel framework, which makes use of an instance based learning technique, for classification purposes, is presented. In addition, an empirical analysis is conducted in order to assess the impact of two key parameters, the sequence length and precision level, on the false alarm and detection rates. Moreover, a strategy for enhancing the characterization of users is also proposed. Based on simulation results, it is feasible to use mobility profiles for anomaly-based intrusion detection in mobile wireless networks.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [1] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [2] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [3] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [4] Anomaly-based intrusion detection using fuzzy rough clustering
    Chimphlee, Witcha
    Abdullah, Abdul Hanan
    Sap, Mohd Noor Md
    Srinoy, Surat
    Chimphlee, Siriporn
    2006 International Conference on Hybrid Information Technology, Vol 1, Proceedings, 2006, : 329 - 334
  • [5] Anomaly-based Intrusion Detection in Computer Networks using Wavelets
    Perlin, Tiago
    Nunes, Raul Ceretta
    Kozakevicius, Alice de Jesus
    REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2011, 3 (01): : 2 - 15
  • [6] Anomaly-based Intrusion Detection Using Auto-encoder
    Nguimbous, Yves Nsoga
    Ksantini, Riadh
    Bouhoula, Adel
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 505 - 509
  • [7] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [8] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [9] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [10] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731