TermID: a distributed swarm intelligence-based approach for wireless intrusion detection

被引:0
作者
Constantinos Kolias
Vasilis Kolias
Georgios Kambourakis
机构
[1] George Mason University,
[2] University of Strathclyde,undefined
[3] University of the Aegean,undefined
来源
International Journal of Information Security | 2017年 / 16卷
关键词
Computer intrusion detection; Wireless networks; Machine learning; Swarm intelligence; Ant colony; Distributed computing;
D O I
暂无
中图分类号
学科分类号
摘要
With the mushrooming of wireless access infrastructures, the amount of data generated, transferred and consumed by the users of such networks has taken enormous proportions. This fact further complicates the task of network intrusion detection, especially when advanced machine learning (ML) operations are involved in the process. In wireless environments, the monitored data are naturally distributed among the numerous sensor nodes of the system. Therefore, the analysis of data must either happen in a central location after first collecting it from the sensors or locally through collaboration by viewing the problem through a distributed ML perspective. In both cases, concerns are risen regarding the requirements of this demanding task in matters of required network resources and achieved security/privacy. This paper proposes TermID, a distributed network intrusion detection system that is well suited for wireless networks. The system is based on classification rule induction and swarm intelligence principles to achieve efficient model training for intrusion detection purposes, without exchanging sensitive data. An additional achievement is that the produced model is easily readable by humans. While these are the main design principles of our approach, the accuracy of the produced model is not compromised by the distribution of the tasks and remains at competitive levels. Both the aforementioned claims are verified by the results of detailed experiments withheld with the use of a publicly available security-focused wireless dataset.
引用
收藏
页码:401 / 416
页数:15
相关论文
共 17 条
  • [1] Kolias C(2013)Attacks and countermeasures on 802.16: analysis and assessment Commun. Surv. Tutor. IEEE 15 487-514
  • [2] Kambourakis G(2013)Lte/sae security issues on 4g wireless networks Secur. Priv. IEEE 11 55-62
  • [3] Gritzalis S(2013)Scaling up classification rule induction through parallel processing Knowl. Eng. Rev. 28 451-478
  • [4] Bikos AN(2002)Data mining with an ant colony optimization algorithm IEEE Trans. Evolut. Comput. 6 321-332
  • [5] Sklavos N(2009)Anomaly-based network intrusion detection: techniques, systems and challenges Comput. Secur. 28 18-28
  • [6] Stahl F(2007)A survey on MANET intrusion detection Int. J. Comput. Sci. Secur. 2 417-432
  • [7] Bramer M(undefined)undefined undefined undefined undefined-undefined
  • [8] Parpinelli RS(undefined)undefined undefined undefined undefined-undefined
  • [9] Lopes HS(undefined)undefined undefined undefined undefined-undefined
  • [10] Freitas AA(undefined)undefined undefined undefined undefined-undefined