Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs

被引:7
作者
Uszko, Krzysztof [1 ]
Kasprzyk, Maciej [1 ]
Natkaniec, Marek [1 ]
Cholda, Piotr [1 ]
机构
[1] AGH Univ Krakow, Inst Telecommun, PL-30059 Krakow, Poland
关键词
5G Wi-Fi security; MAC layer threats; network traffic analysis; threat detection; machine learning; NETWORKS; ATTACKS;
D O I
10.3390/electronics12112355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper is to design and implement a complete system for monitoring and detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the development of most open source systems has been stopped, making them unable to detect emerging forms of threats. The system provides a modular framework to create and add new detection rules as new attacks emerge. The system is based on packet analysis modules and rules and incorporates machine learning models to enhance its efficiency. The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new and emerging attacks at an early stage. Therefore, the ultimate aim is to create a tool that constantly evolves by integrating novel attack detection techniques. The efficiency of the system is proven experimentally with accuracy levels up to 98.57% and precision as well as recall scores as high as 92%.
引用
收藏
页数:28
相关论文
共 42 条
  • [21] Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
    Kolias, Constantinos
    Kambourakis, Georgios
    Stavrou, Angelos
    Gritzalis, Stefanos
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) : 184 - 208
  • [22] Lin S.S., 2022, Sustain. Horiz, V2
  • [23] iWEP: An Intelligent WLAN Early Warning Platform Using Edge Computing
    Liu, Runhao
    Wang, Weitao
    Wang, Jiayao
    Ou, Zhixin
    Qiu, Haozhong
    Wang, Benyu
    Liu, Qiang
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019), 2019, : 384 - 389
  • [24] Beacon frame spoofing attack detection in IEEE 802.11 networks
    Martinez, Asier
    Zurutuza, Urko
    Uribeetxeberria, Roberto
    Fernandez, Miguel
    Lizarraga, Jesus
    Serna, Ainhoa
    Velez, Inaki
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 520 - +
  • [25] Milos C., 2020, KR00K CVE 2019 15126
  • [26] OConnor T., 2015, P 2015 5 INT C IT CO
  • [27] A Meta-Model to Predict and Detect Malicious Activities in 6G-Structured Wireless Communication Networks
    Oleiwi, Haider W. W.
    Mhawi, Doaa N. N.
    Al-Raweshidy, Hamed
    [J]. ELECTRONICS, 2023, 12 (03)
  • [28] Qiang Duan, 2020, 2020 IEEE 6th International Conference on Computer and Communications (ICCC), P830, DOI 10.1109/ICCC51575.2020.9345293
  • [29] Ram J.R., 2016, MASTERING KALI LINUX
  • [30] A Semi-Supervised Learning Approach to IEEE 802.11 Network Anomaly Detection
    Ran, Jing
    Ji, Yidong
    Tang, Bihua
    [J]. 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,