4.5 Article

Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device

期刊

AD HOC NETWORKS
卷 84, 期 -, 页码 82-89

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2018.09.014

关键词

Ad hoc network; Security; Deep learning; Anomaly detection

资金

  1. Ministry of Education - China Mobile Research Foundation [MCM20170206]
  2. Fundamental Research Funds for the Central Universities [lzujblcy-2018-k12]
  3. National Natural Science Foundation of China [61402210, 60973137]
  4. Major National Project of High Resolution Earth Observation System [30-Y20A34-9010-15/17]
  5. State Grid Corporation Science and Technology Project [SGGSKY00FJJS1700302]
  6. Program for New Century Excellent Talents in University [NCET-12-0250]
  7. Strategic Priority Research Program of the Chinese Academy of Sciences [XDA03030100]
  8. Google Research Awards
  9. Google Faculty Award

向作者/读者索取更多资源

Ad-hoc network is a temporary self-organizing network that needs no fixed infrastructure. So it has been applied extensively in many areas requesting temporary communication such as military field, emergency disaster relief and road traffic. While, due to the feature of self-organization and wireless communication channels, ad-hoc network is more vulnerable to various attacks compared to the traditional network. In this paper, we proposed a plug and play device to detect Denial of Service (DoS) and privacy attacks. This device mainly includes capture tool and deep learning detection model. Capture tool is used to grab packets in ad-hoc networks, deep learning detection model is used for detecting attacks. An alarm will be triggered if the detected result is attack. In this way, we can avoid the detected attack to spreading out in larger scale. The proposed method can be used as the second line of dense to issue the early-warning signal. In the experiment, first, we use Deep neural network (DNN) detection model to detect DoS attacks; next, we use DNN, Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) detection model to detect XSS and SQL attacks. The results show that these detection models can achieve very high Accuracy, Precision, Recall and F1 - score. In addition, the time efficiency among the CNN, the LSTM and the DNN is in acceptable range. It proofs that the proposed method can be effectively applied for attack detection. It is important to note that the proposed method can be extended to all other attacks with little modification in ad-hoc networks. (C) 2018 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据