10 research outputs found
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Jamming attacks target a wireless network creating an unwanted denial of
service. 5G is vulnerable to these attacks despite its resilience prompted by
the use of millimeter wave bands. Over the last decade, several types of
jamming detection techniques have been proposed, including fuzzy logic, game
theory, channel surfing, and time series. Most of these techniques are
inefficient in detecting smart jammers. Thus, there is a great need for
efficient and fast jamming detection techniques with high accuracy. In this
paper, we compare the efficiency of several machine learning models in
detecting jamming signals. We investigated the types of signal features that
identify jamming signals, and generated a large dataset using these parameters.
Using this dataset, the machine learning algorithms were trained, evaluated,
and tested. These algorithms are random forest, support vector machine, and
neural network. The performance of these algorithms was evaluated and compared
using the probability of detection, probability of false alarm, probability of
miss detection, and accuracy. The simulation results show that jamming
detection based random forest algorithm can detect jammers with a high
accuracy, high detection probability and low probability of false alarm
Social Engineering Attacks: A Survey
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures
A Novel Prediction Model for Malicious Users Detection and Spectrum Sensing Based on Stacking and Deep Learning
Cooperative network is a promising concept for achieving a high-accuracy decision of spectrum sensing in cognitive radio networks. It enables a collaborative exchange of the sensing measurements among the network users to monitor the primary spectrum occupancy. However, the presence of malicious users leads to harmful interferences in the system by transmitting incorrect local sensing observations.To overcome this security related problem and to improve the accuracy decision of spectrum sensing in cooperative cognitive radio networks, we proposed a new approach based on two machine learning solutions. For the first solution, a new stacking model-based malicious users detection is proposed, using two innovative techniques, including chaotic compressive sensing technique-based authentication for feature extraction with a minimum of measurements and an ensemble machine learning technique for users classification. For the second solution, a novel deep learning technique is proposed, using scalogram images as inputs for the primary user spectrum’s classification. The simulation results show the high efficiency of both proposed solutions, where the accuracy of the new stacking model reaches 97% in the presence of 50% of malicious users, while the new scalogram technique-based spectrum sensing is fast and achieves a high probability of detection with a lower number of epochs and a low probability of false alarm
Chaotic Compressive Spectrum Sensing Based on Chebyshev Map for Cognitive Radio Networks
Recently, the chaotic compressive sensing paradigm has been widely used in many areas, due to its ability to reduce data acquisition time with high security. For cognitive radio networks (CRNs), this mechanism aims at detecting the spectrum holes based on few measurements taken from the original sparse signal. To ensure a high performance of the acquisition and recovery process, the choice of a suitable sensing matrix and the appropriate recovery algorithm should be done carefully. In this paper, a new chaotic compressive spectrum sensing (CSS) solution is proposed for cooperative CRNs based on the Chebyshev sensing matrix and the Bayesian recovery via Laplace prior. The chaotic sensing matrix is used first to acquire and compress the high-dimensional signal, which can be an interesting topic to be published in symmetry journal, especially in the data-compression subsection. Moreover, this type of matrix provides reliable and secure spectrum detection as opposed to random sensing matrix, since any small change in the initial parameters generates a different sensing matrix. For the recovery process, unlike the convex and greedy algorithms, Bayesian models are fast, require less measurement, and deal with uncertainty. Numerical simulations prove that the proposed combination is highly efficient, since the Bayesian algorithm with the Chebyshev sensing matrix provides superior performances, with compressive measurements. Technically, this number can be reduced to 20% of the length and still provides a substantial performance