{"title":"Interpretable CAA classification based on incorporating feature channel attention into LSTM","authors":"Yiting Hou, Xianglin Wei, Jianhua Fan, Chao Wang","doi":"10.1016/j.cose.2024.104252","DOIUrl":null,"url":null,"abstract":"<div><div>The open and broadcast nature of wireless media makes signal transmission among wireless media prone to different types of channel access attacks (CAA), mainly in Medium Access Control (MAC) layer, ranging from constant jamming to protocol manipulation attacks. CAAs can allow an adversary to greatly degrade overall transmission bandwidth or fully hinder legitimate users from access medium. Therefore, it is critical to timely detect and classify CAAs. A few efforts have been made through applying deep neural networks (DNN) for CAA detection. But they still suffer from low accuracy and poor interpretability. In this backdrop, this paper puts forward an interpretable CAA classification DNN model based on feature channel attention (FCA), named FCA-LSTM. After introducing 11 types of CAAs through state transition model, we detail the design of FCA-LSTM, which incorporates three modules, i.e., FCA module, Long Short-Term Memory (LSTM) module, and Grad-CAM module for promoting classification accuracy while reducing the number of parameters. A series of experiments is conducted to compare FCA-LSTM against four benchmarks, including ResNet50, conventional neural network (CNN), Transformer, and LSTM. Results show that FCA-LSTM performs better than four benchmarks in general. Furthermore, the number of parameters and inference time of FCA-LSTM are both much smaller than traditional LSTM. At last, Grad-CAM is utilized to visualize FCA-LSTM’s concern areas of an input sample. This visualization process sheds light on crucial aspects of model’s decision-making process, further fortifying its interpretability and overall reliability.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"150 ","pages":"Article 104252"},"PeriodicalIF":4.8000,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824005583","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The open and broadcast nature of wireless media makes signal transmission among wireless media prone to different types of channel access attacks (CAA), mainly in Medium Access Control (MAC) layer, ranging from constant jamming to protocol manipulation attacks. CAAs can allow an adversary to greatly degrade overall transmission bandwidth or fully hinder legitimate users from access medium. Therefore, it is critical to timely detect and classify CAAs. A few efforts have been made through applying deep neural networks (DNN) for CAA detection. But they still suffer from low accuracy and poor interpretability. In this backdrop, this paper puts forward an interpretable CAA classification DNN model based on feature channel attention (FCA), named FCA-LSTM. After introducing 11 types of CAAs through state transition model, we detail the design of FCA-LSTM, which incorporates three modules, i.e., FCA module, Long Short-Term Memory (LSTM) module, and Grad-CAM module for promoting classification accuracy while reducing the number of parameters. A series of experiments is conducted to compare FCA-LSTM against four benchmarks, including ResNet50, conventional neural network (CNN), Transformer, and LSTM. Results show that FCA-LSTM performs better than four benchmarks in general. Furthermore, the number of parameters and inference time of FCA-LSTM are both much smaller than traditional LSTM. At last, Grad-CAM is utilized to visualize FCA-LSTM’s concern areas of an input sample. This visualization process sheds light on crucial aspects of model’s decision-making process, further fortifying its interpretability and overall reliability.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.