Machine Learning Based Primary User Emulation Attack Detection

被引:0
作者
Camana, Mario R. [1 ]
Garcia, Carla E. [1 ]
Koo, Insoo [1 ]
Shakhov, Vladimir [1 ]
机构
[1] Univ Ulsan, Dept Elect Elect & Comp Engn, Ulsan, South Korea
来源
2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM) | 2022年
基金
新加坡国家研究基金会;
关键词
intrusion detection; cognitive radio; primary user emulation attack; machine learning; NETWORKS;
D O I
10.1109/BLACKSEACOM54372.2022.9858210
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapidly growing demand for IoT applications requires the widespread use of cognitive radio technologies. However, modern wireless communication systems have a large number of vulnerabilities. Malicious nodes can cause heavy performance degradation by DoS attacks. Thus, the problem of developing effective protection mechanisms is quite relevant. In this paper, we consider one of the most destructive DoS attacks in cognitive radio networks called the primary user emulation attack. We offer an effective approach to intrusion detection based on machine learning, suitable for deployment on low-resource network nodes. Moreover, the proposed scheme is compared with several baselines methods by using the metrics of accuracy, precision, recall, and F1 score, where the proposed method achieved the best results.
引用
收藏
页码:244 / 248
页数:5
相关论文
共 15 条
[1]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[2]   Extremely Randomized Trees-Based Scheme for Stealthy Cyber-Attack Detection in Smart Grid Networks [J].
Camana, Mario R. ;
Ahmed, Saeed ;
Garcia, Carla E. ;
Koo, Insoo .
IEEE ACCESS, 2020, 8 :19921-19933
[3]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[4]   Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks [J].
Chen, Zesheng ;
Cooklev, Todor ;
Chen, Chao ;
Pomalaza-Raez, Carlos .
2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, :208-215
[5]   Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks [J].
Fadlullah, Zubair Md. ;
Nishiyama, Hiroki ;
Kato, Nei ;
Fouda, Mostafa M. .
IEEE NETWORK, 2013, 27 (03) :51-56
[6]   Extremely randomized trees [J].
Geurts, P ;
Ernst, D ;
Wehenkel, L .
MACHINE LEARNING, 2006, 63 (01) :3-42
[7]   Systematic Literature Review of Security Event Correlation Methods [J].
Kotenko, Igor ;
Gaifulina, Diana ;
Zelichenok, Igor .
IEEE ACCESS, 2022, 10 :43387-43420
[8]   Prediction of Digital Terrestrial Television Coverage Using Machine Learning Regression [J].
Moreta, Carla E. Garcia ;
Acosta, Mario R. Camana ;
Koo, Insoo .
IEEE TRANSACTIONS ON BROADCASTING, 2019, 65 (04) :702-712
[9]  
Reddy R., 2014, Int. J. Comput. Appl, V98, P34
[10]   On the Suitability of Intrusion Detection System for Wireless Edge Networks [J].
Shakhov, Vladimir ;
Sokolova, Olga ;
Koo, Insoo .
ENERGIES, 2021, 14 (18)