Anomaly-based intrusion detection using mobility profiles of public transportation users

被引:0
|
作者
Hall, J [1 ]
Barbeau, M [1 ]
Kranakis, E [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
mobile networking; security; intrusion detection; IBL; and mobility profiles;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For the purpose of anomaly-based intrusion detection in mobile networks, the utilization of profiles, based on hardware signatures, calling patterns, service usage, and mobility patterns, have been explored by various research teams and commercial systems, namely the Fraud Management System by Hewlett-Packard and Compaq. This paper examines the feasibility of using profiles, which are based on the mobility patterns of mobile users, who make use of public transportation, e.g. bus. More specifically, a novel framework, which makes use of an instance based learning technique, for classification purposes, is presented. In addition, an empirical analysis is conducted in order to assess the impact of two key parameters, the sequence length and precision level, on the false alarm and detection rates. Moreover, a strategy for enhancing the characterization of users is also proposed. Based on simulation results, it is feasible to use mobility profiles for anomaly-based intrusion detection in mobile wireless networks.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [21] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [22] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [23] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [24] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [25] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [26] Accuracy improvement of anomaly-based intrusion detection system using Taguchi method
    Konno, T
    Tateoka, M
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 90 - 93
  • [27] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +
  • [28] Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    SECURITY AND PRIVACY, 2018, 1 (04):
  • [29] Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
    Alsoufi, Muaadh A.
    Siraj, Maheyzah Md
    Ghaleb, Fuad A.
    Al-Razgan, Muna
    Al-Asaly, Mahfoudh Saeed
    Alfakih, Taha
    Saeed, Faisal
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 823 - 845
  • [30] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184