Flow-based Features for a Robust Intrusion Detection System Targeting Mobile Traffic

被引:3
|
作者
Elrawy, Mohammed Faisal [1 ,2 ]
Awad, Ali Ismail [3 ,4 ]
Hamed, Hesham F. A. [5 ]
机构
[1] MUST Univ, 6th Of October, Egypt
[2] Inst Publ Adm, Asir, Saudi Arabia
[3] Lulea Univ Technol, Lulea, Sweden
[4] Al Azhar Univ, Qena, Egypt
[5] Menia Univ, Fac Engn, Al Minya, Egypt
关键词
Intrusion Detection Systems (IDSs); feature extraction; mobile traffic; Internet of Things (IoT) security;
D O I
10.1109/ICT.2016.7500483
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security risks and threats that impact wired and wireless networks are now applicable to mobile telecommunication networks. Threat detection systems should be more intelligent because threats are becoming more dangerous. An intrusion detection system (IDS) is a potential network security solution for protecting the confidentiality, integrity, and availability of user data and information resources. A fast and effective IDS for mobile networks that does not violate the user's privacy or the network's QoS is required. This paper offers a set of flow-based features that can be utilized for mobile network traffic as a prerequisite for a privacy-aware and QoS-robust IDS. The principal component analysis (PCA) method was used for reduction of the features. Twelve features in six groups, which represent the user data in mobile traffic, were extracted and evaluated for IDSs. The evaluation process achieved a F-measure weighted average equal to 0.834, and the experimental time was equal to 12.9 seconds. The accomplished measurements have demonstrated the applicability of the proposed set of features.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Feature Selection for Flow-based Intrusion Detection Using Rough Set Theory
    Beer, Frank
    Buehler, Ulrich
    [J]. PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 617 - 624
  • [42] A Flow-based Entropy Characterization of a NATed Network and its Application on Intrusion Detection
    Crichigno, J.
    Kfoury, E.
    Bou-Harb, E.
    Ghani, N.
    Prieto, Y.
    Vega, C.
    Pezoa, J.
    Huang, C.
    Torres, D.
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [43] Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis
    Szczepanik, Wojciech
    Niemiec, Marcin
    [J]. ENERGIES, 2022, 15 (11)
  • [44] An Iris Recognition Based Robust Intrusion Detection System
    Joshi, Kavita
    Agrawal, Sunil
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [45] Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks
    Duy, Phan The
    Khoa, Nghi Hoang
    Hien, Do Thi Thu
    Hoang, Hien Do
    Pham, Van-Hau
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [46] Implementation of an intrusion detection system based on mobile agents
    Bernardes, MC
    Moreira, ED
    [J]. INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 158 - 164
  • [47] Research in Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong
    Yu, Zhou
    Zheng, Wei
    Zuo, Xiangang
    [J]. INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 233 - 240
  • [48] A Distributed Intrusion Detection System Based on Mobile Agents
    Mo Xiu-liang
    Wang Chun-dong
    Wang Huai-bin
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2110 - 2114
  • [49] A model for mobile agent based intrusion detection system
    Hu, JL
    Wang, JZ
    Liu, AZ
    Yang, SM
    [J]. ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, : 569 - 574
  • [50] SPARTA -: A mobile agent based intrusion detection system
    Krügel, C
    Toth, T
    Kirda, E
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 187 - 198