GRU-SVM Based Threat Detection in Cognitive Radio Network

被引:6
作者
Ezhilarasi, Evelyn [1 ]
Clement, J. Christopher [1 ]
机构
[1] Vellore Inst Technol, Sch Elect Engn, Vellore 632014, Tamil Nadu, India
关键词
spectrum sensing; gated recurrent unit; cognitive radio network; support vector machine; malicious users; ATTACK DETECTION; SECURITY;
D O I
10.3390/s23031326
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cognitive radio networks are vulnerable to numerous threats during spectrum sensing. Different approaches can be used to lessen these attacks as the malicious users degrade the performance of the network. The cutting-edge technologies of machine learning and deep learning step into cognitive radio networks (CRN) to detect network problems. Several studies have been conducted utilising various deep learning and machine learning methods. However, only a small number of analyses have used gated recurrent units (GRU), and that too in software defined networks, but these are seldom used in CRN. In this paper, we used GRU in CRN to train and test the dataset of spectrum sensing results. One of the deep learning models with less complexity and more effectiveness for small datasets is GRU, the lightest variant of the LSTM. The support vector machine (SVM) classifier is employed in this study's output layer to distinguish between authorised users and malicious users in cognitive radio network. The novelty of this paper is the application of combined models of GRU and SVM in cognitive radio networks. A high testing accuracy of 82.45%, training accuracy of 80.99% and detection probability of 1 is achieved at 65 epochs in this proposed work.
引用
收藏
页数:17
相关论文
共 39 条
[1]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[2]   A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users [J].
Ahmed, Arshed ;
Khan, Muhammad Sajjad ;
Gul, Noor ;
Uddin, Irfan ;
Kim, Su Min ;
Kim, Junsu .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[3]  
Alhammadi A., 2019, INT J ELECT COMPUT E, V9, P5330, DOI [10.11591/ijece.v9i6.pp5330-5339, DOI 10.11591/IJECE.V9I6.PP5330-5339]
[4]  
Alhammadi A, 2016, I SYMPOS TELECOM TEC, P103, DOI 10.1109/ISTT.2016.7918093
[5]   A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions [J].
Arjoune, Youness ;
Kaabouch, Naima .
SENSORS, 2019, 19 (01)
[6]   An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks [J].
Arun, S. ;
Umamaheswari, G. .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2020, 39 (02) :1071-1088
[7]   A GRU deep learning system against attacks in software defined networks [J].
Assis, Marcos V. O. ;
Carvalho, Luiz F. ;
Lloret, Jaime ;
Proenca, Mario L. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 177
[8]  
Aygul M.A., 2020, PROC IEEE VEH TECHNO, P1, DOI [10.1109/VTC2020-Spring48590.2020.9129001, DOI 10.1109/VTC2020-SPRING48590.2020.9129001]
[9]  
Bastola S.B., 2021, P 2017 INT C ADV COM
[10]   Effects of Machine Learning Approach in Flow-Based Anomaly Detection on Software-Defined Networking [J].
Dey, Samrat Kumar ;
Rahman, Md. Mahbubur .
SYMMETRY-BASEL, 2020, 12 (01)