Flow-based Features for a Robust Intrusion Detection System Targeting Mobile Traffic

被引:3
|
作者
Elrawy, Mohammed Faisal [1 ,2 ]
Awad, Ali Ismail [3 ,4 ]
Hamed, Hesham F. A. [5 ]
机构
[1] MUST Univ, 6th Of October, Egypt
[2] Inst Publ Adm, Asir, Saudi Arabia
[3] Lulea Univ Technol, Lulea, Sweden
[4] Al Azhar Univ, Qena, Egypt
[5] Menia Univ, Fac Engn, Al Minya, Egypt
关键词
Intrusion Detection Systems (IDSs); feature extraction; mobile traffic; Internet of Things (IoT) security;
D O I
10.1109/ICT.2016.7500483
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security risks and threats that impact wired and wireless networks are now applicable to mobile telecommunication networks. Threat detection systems should be more intelligent because threats are becoming more dangerous. An intrusion detection system (IDS) is a potential network security solution for protecting the confidentiality, integrity, and availability of user data and information resources. A fast and effective IDS for mobile networks that does not violate the user's privacy or the network's QoS is required. This paper offers a set of flow-based features that can be utilized for mobile network traffic as a prerequisite for a privacy-aware and QoS-robust IDS. The principal component analysis (PCA) method was used for reduction of the features. Twelve features in six groups, which represent the user data in mobile traffic, were extracted and evaluated for IDSs. The evaluation process achieved a F-measure weighted average equal to 0.834, and the experimental time was equal to 12.9 seconds. The accomplished measurements have demonstrated the applicability of the proposed set of features.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
  • [2] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [3] SSHCure: A Flow-Based SSH Intrusion Detection System
    Hellemons, Laurens
    Hendriks, Luuk
    Hofstede, Rick
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 86 - 97
  • [4] Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection
    Rodriguez, Maria
    Alesanco, Alvaro
    Mehavilla, Lorena
    Garcia, Jose
    [J]. SENSORS, 2022, 22 (23)
  • [5] Ensemble Learning Approach for Flow-based Intrusion Detection System
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    [J]. 2019 IEEE AFRICON, 2019,
  • [6] Flow-Based Intrusion Detection Systems: A Survey
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 121 - 137
  • [7] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    [J]. COMPUTERS & SECURITY, 2017, 70 : 238 - 254
  • [8] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [9] An explainable efficient flow-based Industrial IoT intrusion detection system
    Alani, Mohammed M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [10] Clustering and Neural Visualization for Flow-Based Intrusion Detection
    Sanchez, Raul
    Herrero, Alvaro
    Corchado, Emilio
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 333 - 345