基于改进机器学习的智慧城市无线通信网络欺骗流量攻击识别算法

IF 0.8 4区 材料科学 Q4 MATERIALS SCIENCE, CHARACTERIZATION & TESTING Journal of Testing and Evaluation Pub Date : 2023-10-20 DOI:10.1520/jte20220720
Liping Hao, Yinghui Ma
{"title":"基于改进机器学习的智慧城市无线通信网络欺骗流量攻击识别算法","authors":"Liping Hao, Yinghui Ma","doi":"10.1520/jte20220720","DOIUrl":null,"url":null,"abstract":"It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.","PeriodicalId":17109,"journal":{"name":"Journal of Testing and Evaluation","volume":"11 3","pages":"0"},"PeriodicalIF":0.8000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Spoofing Traffic Attack Recognition Algorithm for Wireless Communication Networks in a Smart City Based on Improved Machine Learning\",\"authors\":\"Liping Hao, Yinghui Ma\",\"doi\":\"10.1520/jte20220720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.\",\"PeriodicalId\":17109,\"journal\":{\"name\":\"Journal of Testing and Evaluation\",\"volume\":\"11 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2023-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Testing and Evaluation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1520/jte20220720\",\"RegionNum\":4,\"RegionCategory\":\"材料科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"MATERIALS SCIENCE, CHARACTERIZATION & TESTING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Testing and Evaluation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1520/jte20220720","RegionNum":4,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATERIALS SCIENCE, CHARACTERIZATION & TESTING","Score":null,"Total":0}
引用次数: 0

摘要

在无线通信网络中,欺骗流量攻击信息很难被发现,导致欺骗流量攻击识别性能较差。因此,设计了一种基于改进机器学习的无线通信网络欺骗流量攻击识别算法。分析了网络流量分类的过程和几种常见的网络欺骗流量攻击。采用混沌算法对无线通信网络数据进行搜索和采集,并采用Min-Max和z-score对采集数据进行标准化。构造了无线通信网络欺骗流量攻击的风险评估函数,并根据该函数初步确定了欺骗流量攻击。对机器学习中的卷积神经网络进行改进,将初步判断结果输入到改进后的卷积神经网络中进行攻击行为识别。实验结果表明,该方法对无线通信网络欺骗流量攻击的召回率最高可达90.08%,识别过程最低仅需1763 ms。可以将攻击的误报率控制在4.68%以下,误报率控制在2.00%以下,对欺骗流量攻击的识别效果良好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Spoofing Traffic Attack Recognition Algorithm for Wireless Communication Networks in a Smart City Based on Improved Machine Learning
It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Testing and Evaluation
Journal of Testing and Evaluation 工程技术-材料科学:表征与测试
CiteScore
2.30
自引率
8.30%
发文量
221
审稿时长
6.7 months
期刊介绍: This journal is published in six issues per year. Some issues, in whole or in part, may be Special Issues focused on a topic of interest to our readers. This flagship ASTM journal is a multi-disciplinary forum for the applied sciences and engineering. Published bimonthly, the Journal of Testing and Evaluation presents new technical information, derived from field and laboratory testing, on the performance, quantitative characterization, and evaluation of materials. Papers present new methods and data along with critical evaluations; report users'' experience with test methods and results of interlaboratory testing and analysis; and stimulate new ideas in the fields of testing and evaluation. Major topic areas are fatigue and fracture, mechanical testing, and fire testing. Also publishes review articles, technical notes, research briefs and commentary.
期刊最新文献
Influence of Soil Excavation on Bearing Behavior of Pile Group Foundation Composed of Underpinning Piles and Existing Piles Comparison between Four-Probe and Two-Probe Electrical Resistivity Measurement to Monitor the Curing and Piezoresistivity Behavior of Smart Cement Paste Modified with Waste Steel Slag and Green Nano-magnetite Study on the Compressive Properties of RPC Restrained by CFRP Sheet under Low-Temperature Curing A Statistical Study of Arien Sequences for an H.264 Prediction Module Lower Complexity Micro-constructive Damage Model of Dry-Wet Cyclic Red Clay Based on Weibull Distribution
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1