Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs

被引:7
作者
Uszko, Krzysztof [1 ]
Kasprzyk, Maciej [1 ]
Natkaniec, Marek [1 ]
Cholda, Piotr [1 ]
机构
[1] AGH Univ Krakow, Inst Telecommun, PL-30059 Krakow, Poland
关键词
5G Wi-Fi security; MAC layer threats; network traffic analysis; threat detection; machine learning; NETWORKS; ATTACKS;
D O I
10.3390/electronics12112355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper is to design and implement a complete system for monitoring and detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the development of most open source systems has been stopped, making them unable to detect emerging forms of threats. The system provides a modular framework to create and add new detection rules as new attacks emerge. The system is based on packet analysis modules and rules and incorporates machine learning models to enhance its efficiency. The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new and emerging attacks at an early stage. Therefore, the ultimate aim is to create a tool that constantly evolves by integrating novel attack detection techniques. The efficiency of the system is proven experimentally with accuracy levels up to 98.57% and precision as well as recall scores as high as 92%.
引用
收藏
页数:28
相关论文
共 42 条
  • [1] Agarwal M., 2013, INDIA C INDICON 2013, P1, DOI [10.1109/INDCON.2013.6726015, DOI 10.1109/INDCON.2013.6726015]
  • [2] Detection of De-authentication DoS attacks in Wi-Fi Networks: A Machine Learning Approach
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 246 - 251
  • [3] Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis
    Alipour, Hamid
    Al-Nashif, Youssif B.
    Satam, Pratik
    Hariri, Salim
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2158 - 2170
  • [4] Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
    Aminanto, Muhamad Erza
    Choi, Rakyong
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 621 - 636
  • [5] [Anonymous], 2004, IEEE Standard for Information Technology - Portable Operating System Interface (POSIX). Base Definitions, V2004
  • [6] [Anonymous], ASPJ P L MDK4
  • [7] Baharudin N., 2020, INT J ADV TRENDS COM, V9, P92, DOI [10.30534/ijatcse/2020/1391.32020, DOI 10.30534/IJATCSE/2020/1391.32020]
  • [8] Baharudin N., 2015, P 2015 5 INT C IT CO, P1, DOI [10.1109/ICITCS.2015.7293037, DOI 10.1109/ICITCS.2015.7293037]
  • [9] Biondi P, SCAPY COMMUNITY SCAP
  • [10] Brandon Butler R.M, 2019, LIDC MARKETSCAPE WOR