{"title":"基于改进机器学习的智慧城市无线通信网络欺骗流量攻击识别算法","authors":"Liping Hao, Yinghui Ma","doi":"10.1520/jte20220720","DOIUrl":null,"url":null,"abstract":"It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.","PeriodicalId":17109,"journal":{"name":"Journal of Testing and Evaluation","volume":"11 3","pages":"0"},"PeriodicalIF":0.8000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Spoofing Traffic Attack Recognition Algorithm for Wireless Communication Networks in a Smart City Based on Improved Machine Learning\",\"authors\":\"Liping Hao, Yinghui Ma\",\"doi\":\"10.1520/jte20220720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.\",\"PeriodicalId\":17109,\"journal\":{\"name\":\"Journal of Testing and Evaluation\",\"volume\":\"11 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2023-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Testing and Evaluation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1520/jte20220720\",\"RegionNum\":4,\"RegionCategory\":\"材料科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"MATERIALS SCIENCE, CHARACTERIZATION & TESTING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Testing and Evaluation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1520/jte20220720","RegionNum":4,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATERIALS SCIENCE, CHARACTERIZATION & TESTING","Score":null,"Total":0}
Spoofing Traffic Attack Recognition Algorithm for Wireless Communication Networks in a Smart City Based on Improved Machine Learning
It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.
期刊介绍:
This journal is published in six issues per year. Some issues, in whole or in part, may be Special Issues focused on a topic of interest to our readers.
This flagship ASTM journal is a multi-disciplinary forum for the applied sciences and engineering. Published bimonthly, the Journal of Testing and Evaluation presents new technical information, derived from field and laboratory testing, on the performance, quantitative characterization, and evaluation of materials. Papers present new methods and data along with critical evaluations; report users'' experience with test methods and results of interlaboratory testing and analysis; and stimulate new ideas in the fields of testing and evaluation.
Major topic areas are fatigue and fracture, mechanical testing, and fire testing. Also publishes review articles, technical notes, research briefs and commentary.