Search Results

Now showing 1 - 4 of 4
  • Article
    Citation - WoS: 24
    Citation - Scopus: 41
    Network Intrusion Detection With a Hashing Based Apriori Algorithm Using Hadoop Mapreduce
    (Mdpi, 2019) Azeez, Nureni Ayofe; Ayemobola, Tolulope Jide; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, Robertas
    Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to many global financial loses and privacy problems for Internet users across the globe. In order to safeguard the network and to prevent Internet users from being the regular victims of cyber-criminal activities, new solutions are needed. This research proposes solution for intrusion detection by using the improved hashing-based Apriori algorithm implemented on Hadoop MapReduce framework; capable of using association rules in mining algorithm for identifying and detecting network intrusions. We used the KDD dataset to evaluate the effectiveness and reliability of the solution. Our results obtained show that this approach provides a reliable and effective means of detecting network intrusion.
  • Article
    Citation - WoS: 57
    Citation - Scopus: 73
    Assessment of Features and Classifiers for Bluetooth Rf Fingerprinting
    (Ieee-inst Electrical Electronics Engineers inc, 2019) Ali, Aysha M.; Uzundurukan, Emre; Kara, Ali
    Recently, network security has become a major challenge in communication networks. Most wireless networks are exposed to some penetrative attacks such as signal interception, spoofing, and stray. Radio frequency (RF) fingerprinting is considered to be a promising solution for network security problems and has been applied with various improvements. In this paper, extensive data from Bluetooth (BT) devices are utilized in RF fingerprinting implementation. Hilbert-Huang transform (HHT) has been used, for the first time, for RF fingerprinting of Bluetooth (BT) device identification. In this way, time-frequency-energy distributions (TFED) are utilized. By means of the signals' energy envelopes, the transient signals are detected with some improvements. Thirteen features are extracted from the signals' transients along with their TFEDs. The extracted features are pre-processed to evaluate their usability. The implementation of three different classifiers to the extracted features is provided for the first time in this paper. A comparative analysis based on the receiver operating characteristics (ROC) curves, the associated areas under curves (AUC), and confusion matrix are obtained to visualize the performance of the applied classifiers. In doing this, different levels of signal to noise ratio (SNR) levels are used to evaluate the robustness of the extracted features and the classifier performances. The classification performance demonstrates the feasibility of the method. The results of this paper may help readers assess the usability of RF fingerprinting for BT signals at the physical layer security of wireless networks.
  • Article
    Citation - WoS: 10
    Citation - Scopus: 16
    A Survey and Meta-Analysis of Application-Layer Distributed Denial-Of Attack
    (Wiley, 2020) Odusami, Modupe; Misra, Sanjay; Abayomi-Alli, Olusola; Abayomi-Alli, Adebayo; Fernandez-Sanz, Luis
    Background One of the significant attacks targeting the application layer is the distributed denial-of-service (DDoS) attack. It degrades the performance of the server by usurping its resources completely, thereby denying access to legitimate users and causing losses to businesses and organizations. Aim This study aims to investigate existing methodologies for application-layer DDoS (APDDoS) attack defense by using specific measures: detection methods/techniques, attack strategy, and feature exploration of existing APDDoS mechanisms. Methodology The review is carried out on a database search of relevant literature in IEEE Xplore, ACM, Science Direct, Springer, Wiley, and Google Search. The search dates to capture journals and conferences are from 2000 to 2019. Review papers that are not in English and not addressing the APDDoS attack are excluded. Three thousand seven hundred eighty-nine studies are identified and streamlined to a total of 75 studies. A quantifiable assessment is performed on the selected articles using six search procedures, namely: source, methods/technique, attack strategy, datasets/corpus, status, detection metric, and feature exploration. Results Based on existing methods/techniques for detection, the results show that machine learning gave the highest proportion with 36%. However, assessment based on attack strategy shows that several studies do not consider an attack form for deploying their solution. Result based on existing features for the APDDoS detection technique shows request stream during a user session and packet pattern gave the highest result with 47%. Unlike packet header information with 33%, request stream during absolute time interval with 12% and web user features 8%. Conclusion Research findings show that a large proportion of the solutions for APDDoS attack detection utilized features based on request stream during user session and packet pattern. The optimization of features will improve detection accuracy. Our study concludes that researchers need to exploit all attack strategies using deep learning algorithms, thus enhancing effective detection of APDDoS attack launch from different botnets.
  • Review
    Citation - WoS: 245
    Citation - Scopus: 528
    A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    (Mdpi, 2023) Aslan, Omer; Aktug, Semih Serkant; Ozkan-Okay, Merve; Yilmaz, Abdullah Asim; Akin, Erdal
    Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.