Anomaly-based intrusion detection using mobility profiles of public transportation users

被引:0
|
作者
Hall, J [1 ]
Barbeau, M [1 ]
Kranakis, E [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
mobile networking; security; intrusion detection; IBL; and mobility profiles;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For the purpose of anomaly-based intrusion detection in mobile networks, the utilization of profiles, based on hardware signatures, calling patterns, service usage, and mobility patterns, have been explored by various research teams and commercial systems, namely the Fraud Management System by Hewlett-Packard and Compaq. This paper examines the feasibility of using profiles, which are based on the mobility patterns of mobile users, who make use of public transportation, e.g. bus. More specifically, a novel framework, which makes use of an instance based learning technique, for classification purposes, is presented. In addition, an empirical analysis is conducted in order to assess the impact of two key parameters, the sequence length and precision level, on the false alarm and detection rates. Moreover, a strategy for enhancing the characterization of users is also proposed. Based on simulation results, it is feasible to use mobility profiles for anomaly-based intrusion detection in mobile wireless networks.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [41] Anomaly-Based Intrusion Detection for Detecting Blackhole Attack Mitigataion
    Abdelhamid, Ashraf
    Elsayed, Mahmoud Said
    Aslan, Heba K.
    Azer, Marianne A.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [42] Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
    El-Alfy, El-Sayed M.
    Al-Utaibi, Khaled A.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1273 - 1281
  • [43] A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2160 - 2167
  • [44] Stream Learning and Anomaly-based Intrusion Detection in the Adversarial Settings
    Viegas, Eduardo
    Santin, Altair
    Abreu, Vilmar
    Oliveira, Luiz S.
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 773 - 778
  • [45] Anomaly-based intrusion detection: privacy concerns and other problems
    Lundin, E
    Jonsson, E
    COMPUTER NETWORKS, 2000, 34 (04) : 623 - 640
  • [46] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [47] Enabling Anomaly-based Intrusion Detection Through Model Generalization
    Viegas, Eduardo
    Santin, Altair
    Ahreu, Vilmar
    Oliveira, Luiz S.
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 939 - 944
  • [48] An Application of Membrane Computing to Anomaly-Based Intrusion Detection System
    Idowu, Rufai Kazeem
    Maroosi, Ali
    Muniyandi, Ravie Chandren
    Othman, Zulaiha Ali
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 585 - 592
  • [49] An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
    Chae, Younghun
    Katenka, Natallia
    DiPippo, Lisa
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 221 - 224
  • [50] An application of learning problem in anomaly-based intrusion detection systems
    Jecheva, Veselina G.
    Nikolova, Evgeniya P.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 853 - 860