Anomaly-based intrusion detection using mobility profiles of public transportation users

被引:0
|
作者
Hall, J [1 ]
Barbeau, M [1 ]
Kranakis, E [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
mobile networking; security; intrusion detection; IBL; and mobility profiles;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For the purpose of anomaly-based intrusion detection in mobile networks, the utilization of profiles, based on hardware signatures, calling patterns, service usage, and mobility patterns, have been explored by various research teams and commercial systems, namely the Fraud Management System by Hewlett-Packard and Compaq. This paper examines the feasibility of using profiles, which are based on the mobility patterns of mobile users, who make use of public transportation, e.g. bus. More specifically, a novel framework, which makes use of an instance based learning technique, for classification purposes, is presented. In addition, an empirical analysis is conducted in order to assess the impact of two key parameters, the sequence length and precision level, on the false alarm and detection rates. Moreover, a strategy for enhancing the characterization of users is also proposed. Based on simulation results, it is feasible to use mobility profiles for anomaly-based intrusion detection in mobile wireless networks.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [31] An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor
    Singh K.P.
    Kesswani N.
    SN Computer Science, 2022, 3 (2)
  • [32] Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports
    Sczari, Behrooz
    Moller, Dietmar P. F.
    Deutschmann, Andreas
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1725 - 1729
  • [33] Anomaly-based intrusion monitoring using a dynamic honeypot
    Hieb, J
    Graham, JH
    PROCEEDINGS OF THE ISCA 20TH INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS, 2005, : 184 - 189
  • [34] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [35] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [36] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92
  • [37] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [38] Measuring normality in HTTP traffic for anomaly-based intrusion detection
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    COMPUTER NETWORKS, 2004, 45 (02) : 175 - 193
  • [39] An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 99 - 104
  • [40] Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
    Ghafouri, Amin
    Abbas, Waseem
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 415 - 434