Abstract

It is difficult to find spoofing traffic attack information for a wireless communication network, which leads to poor performance of spoofing traffic attack identification. Therefore, a spoofing traffic attack recognition algorithm for wireless communication networks based on improved machine learning has been designed. The process of network traffic classification and several common network cheating traffic attacks are analyzed. A chaotic algorithm is used to search and collect wireless communication network data, and Min-Max and z-score are used to standardize the collected data. The risk assessment function of wireless communication network spoofing traffic attack is constructed, and the spoofing traffic attack is preliminarily determined according to the function. The convolutional neural network in machine learning is improved, and the preliminary judgment results are input into the improved convolutional neural network to identify the attack behavior. The experimental results show that the recall rate of this method for wireless communication network spoofing traffic attacks can reach 90.08 % at the highest level, and the identification process takes only 1,763 ms at the lowest level. It can control the false positive rate of attacks below 4.68 % and the false positive rate below 2.00 %, and the identification effect of spoofing traffic attacks is good.

References

1.
Cao
Y.-C.
,
Zhu
G.-S.
,
Sun
W.-H.
, and
Wu
S.-C.
, “
Study on Key Technologies of Unknown Network Attack Identification
,”
Computer Science
49
, no. 
6A
(December
2022
):
581
587
, https://doi.org/10.11896/jsjkx.210400044
2.
Li
F. Q.
,
Gao
L. S.
,
Zheng
B. Z.
, and
Gu
X. Q.
, “
Event-Triggered Secure Control for Networked Systems under Deception Attacks
,”
Computer Engineering and Applications
57
, no. 
5
(March
2021
):
264
270
, https://doi.org/10.3778/j.issn.1002-8331.1912-0001
3.
Abu Al-Haija
Q.
, “
Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks
,”
Frontiers in Big Data
4
(
2021
): 782902, https://doi.org/10.3389/fdata.2021.782902
4.
Taoufik
A.
,
Defoort
M.
,
Busawon
K.
,
Dala
L.
, and
Djemai
M.
, “
A Distributed Observer-Based Cyber-Attack Identification Scheme in Cooperative Networked Systems under Switching Communication Topologies
,”
Electronics
9
, no. 
11
(November
2020
): 1912, https://doi.org/10.3390/electronics9111912
5.
Hu
Y. J.
,
Ma
J.
,
Guo
Y. B.
, and
Zhang
H.
, “
Research on Active Defense Based on Multi-stage Cyber Deception Game
,”
Journal on Communications
41
, no. 
8
(August
2020
):
32
42
, https://doi.org/10.11959/j.issn.1000-436x.2020112
6.
Wang
T.
,
Wang
N.
,
Cui
Y. P.
, and
Li
H.
, “
The Optimization Method of Wireless Network Attacks Detection Based on Semi-supervised Learning
,”
Journal of Computer Research and Development
57
, no. 
4
(April
2020
):
791
802
, https://doi.org/10.7544/issn1000-1239.2020.20190880
7.
Albrecht
S.
,
Braun
S.
, and
Lucia
S.
, “
Adaptively Robust Nonlinear Model Predictive Control Based on Attack Identification
,”
Automatisierungstechnik
70
, no. 
4
(March
2022
):
367
377
, https://doi.org/10.1515/auto-2021-0109
8.
Ma
G.
,
“Design of Network Attack Identification System Based on Stackelberg Markov” (in Chinese)
,
Modern Electronic Technology
44
, no. 
01
(December
2021
):
29
33
, https://doi.org/10.16652/j.issn.1004-373x.2021.01.007
9.
Mei
R.
,
Yan
H.-B.
,
Shen
Y.
, and
Han
Z.-H.
, “
Application Research of Slicing Technology of Binary Executables in Malware Detection
” (in Chinese),
Journal of Cyber Security
6
, no. 
03
(May
2021
):
125
140
, https://doi.org/10.19363/J.cnki.cn10-1380/tn.2021.05.08
10.
Yu
Y.-T.
and
Wu
M.-H.
, “
Deep Mining Method of Network Information Security Vulnerability in Spoofing Attack Environment
” (in Chinese),
Techniques of Automation and Applications
41
, no. 
7
(July
2022
): 91–93+141, https://doi.org/10.20033/j.1003-7241.(2022)07-0091-04
11.
Kotenko
I.
,
Saenko
I.
,
Lauta
O.
, and
Kribel
A.
, “
Ensuring the Survivability of Embedded Computer Networks Based on Early Detection of Cyber Attacks by Integrating Fractal Analysis and Statistical Methods
,”
Microprocessors and Microsystems
90
(April
2022
): 104459, https://doi.org/10.1016/j.micpro.2022.104459
12.
Bagui
S.
,
Kalaimannan
E.
,
Bagui
S.
,
Nandi
D.
, and
Pinto
A.
, “
Using Machine Learning Techniques to Identify Rare Cyber-Attacks on the UNSW-NB15 Dataset
,”
Security and Privacy
2
, no. 
6
(November/December
2019
): e91, https://doi.org/10.1002/spy2.91
13.
Bhuvaneswari Amma
N. G.
, “
A Vector Convolutional Deep Autonomous Learning Classifier for Detection of Cyber Attacks
,”
Cluster Computing
25
, no. 
5
(October
2022
):
3447
3458
, https://doi.org/10.1007/s10586-022-03577-4
14.
Hu
Y. J.
,
Guo
Y. B.
,
Ma
J.
,
Zhang
H.
, and
Mao
X. Q.
, “
Method to Generate Cyber Deception Traffic Based on Adversarial Sample
,”
Journal on Communications
41
, no. 
9
(September
2020
):
59
70
.
15.
Díaz-Verdejo
J.
,
Muñoz-Calle
J.
,
Estepa Alonso
A.
,
Estepa Alonso
R.
, and
Madinabeitia
G.
, “
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
,”
Applied Sciences
12
, no. 
2
(January
2022
): 852, https://doi.org/10.3390/app12020852
16.
Ovasapyan
T. D.
,
Danilov
V. D.
, and
Moskvin
D. A.
, “
Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices
,”
Automatic Control and Computer Sciences
55
, no. 
8
(December
2021
):
991
998
, https://doi.org/10.3103/S0146411621080241
17.
Xiao
K.
, “
Design of Simulation Experiments for Parallel Intrusion of Malicious Network Attacks
,”
Computer Simulation
37
, no. 
03
(March
2020
):
292
296
.
18.
Stepanov
M. D.
,
Pavlenko
E. Y.
, and
Lavrova
D. S.
, “
Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm
,”
Automatic Control and Computer Sciences
55
, no. 
8
(December
2021
):
1039
1050
, https://doi.org/10.3103/S0146411621080307
19.
Jenabzadeh
A.
,
Safarinejadian
B.
,
Lu
Y.
, and
Zhang
W. D.
. “
Distributed Event-Triggered Target Tracking under Cyber Attacks
,”
Journal of the Franklin Institute
359
, no. 
5
(March
2022
):
2377
2402
, https://doi.org/10.1016/j.jfranklin.2021.12.020
20.
Di
C.
and
Li
T.
, “
Network Unknown Attack Detection with Deep Learning
,”
Computer Engineering and Applications
56
, no. 
22
(November
2020
):
109
116
, https://doi.org/10.3778/j.issn.1002-8331.2003-0353
This content is only available via PDF.
You do not currently have access to this content.