Flow-based features for a robust intrusion detection system targeting mobile traffic

作者: Mohammed Faisal Elrawy , Ali Ismail Awad , Hesham F. A. Hamed

DOI: 10.1109/ICT.2016.7500483

关键词:

摘要: The security risks and threats that impact wired wireless networks are now applicable to mobile telecommunication networks. Threat detection systems should be more intelligent because becoming dangerous. An intrusion system (IDS) is a potential network solution for protecting the confidentiality, integrity, availability of user data information resources. A fast effective IDS does not violate user's privacy or network's QoS required. This paper offers set flow-based features can utilized traffic as prerequisite privacy-aware QoS-robust IDS. principal component analysis (PCA) method was used reduction features. Twelve in six groups, which represent traffic, were extracted evaluated IDSs. evaluation process achieved F-measure weighted average equal 0.834, experimental time 12.9 seconds. accomplished measurements have demonstrated applicability proposed

参考文章(22)
Bernhard Walke, Peter Stuckmann, Traffic engineering concepts for cellular packet radio networks with quality of service support Publikationsserver der RWTH Aachen University. ,(2003)
Thorsten Kramp, Rob van Kranenburg, Sebastian Lange, Introduction to the Internet of Things Springer, Berlin, Heidelberg. pp. 1- 10 ,(2013) , 10.1007/978-3-642-40403-0_1
Kanoksri Sarinnapakorn, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang, A Novel Anomaly Detection Scheme Based on Principal Component Classifier international conference on data mining. pp. 172- 179 ,(2003)
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Shamsuddin, Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection Lecture Notes in Computer Science. pp. 512- 524 ,(2007) , 10.1007/978-3-540-74472-6_42
Peter Stuckmann, Quality of Service Management in GPRS-Based Radio Access Networks Telecommunication Systems. ,vol. 19, pp. 515- 546 ,(2002) , 10.1023/A:1013811026373
Kai Zhao, Lina Ge, A Survey on the Internet of Things Security computational intelligence and security. pp. 663- 667 ,(2013) , 10.1109/CIS.2013.145
Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross, Immune system approaches to intrusion detection --- a review Natural Computing. ,vol. 6, pp. 413- 466 ,(2007) , 10.1007/S11047-006-9026-4
Javier Rubio-Loyola, Dolors Sala, Ali Ismail Ali, Maximizing packet loss monitoring accuracy for reliable trace collections workshop on local and metropolitan area networks. pp. 61- 66 ,(2008) , 10.1109/LANMAN.2008.4675845
Srilatha Chebrolu, Ajith Abraham, Johnson P Thomas, None, Feature deduction and ensemble design of intrusion detection systems Computers & Security. ,vol. 24, pp. 295- 307 ,(2005) , 10.1016/J.COSE.2004.09.008