3 results
Search Results
Now showing 1 - 3 of 3
Article Citation - WoS: 24Citation - Scopus: 41Network Intrusion Detection With a Hashing Based Apriori Algorithm Using Hadoop Mapreduce(Mdpi, 2019) Azeez, Nureni Ayofe; Ayemobola, Tolulope Jide; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, RobertasUbiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to many global financial loses and privacy problems for Internet users across the globe. In order to safeguard the network and to prevent Internet users from being the regular victims of cyber-criminal activities, new solutions are needed. This research proposes solution for intrusion detection by using the improved hashing-based Apriori algorithm implemented on Hadoop MapReduce framework; capable of using association rules in mining algorithm for identifying and detecting network intrusions. We used the KDD dataset to evaluate the effectiveness and reliability of the solution. Our results obtained show that this approach provides a reliable and effective means of detecting network intrusion.Article Citation - WoS: 57Citation - Scopus: 73Assessment of Features and Classifiers for Bluetooth Rf Fingerprinting(Ieee-inst Electrical Electronics Engineers inc, 2019) Ali, Aysha M.; Uzundurukan, Emre; Kara, AliRecently, network security has become a major challenge in communication networks. Most wireless networks are exposed to some penetrative attacks such as signal interception, spoofing, and stray. Radio frequency (RF) fingerprinting is considered to be a promising solution for network security problems and has been applied with various improvements. In this paper, extensive data from Bluetooth (BT) devices are utilized in RF fingerprinting implementation. Hilbert-Huang transform (HHT) has been used, for the first time, for RF fingerprinting of Bluetooth (BT) device identification. In this way, time-frequency-energy distributions (TFED) are utilized. By means of the signals' energy envelopes, the transient signals are detected with some improvements. Thirteen features are extracted from the signals' transients along with their TFEDs. The extracted features are pre-processed to evaluate their usability. The implementation of three different classifiers to the extracted features is provided for the first time in this paper. A comparative analysis based on the receiver operating characteristics (ROC) curves, the associated areas under curves (AUC), and confusion matrix are obtained to visualize the performance of the applied classifiers. In doing this, different levels of signal to noise ratio (SNR) levels are used to evaluate the robustness of the extracted features and the classifier performances. The classification performance demonstrates the feasibility of the method. The results of this paper may help readers assess the usability of RF fingerprinting for BT signals at the physical layer security of wireless networks.Review Citation - WoS: 245Citation - Scopus: 528A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions(Mdpi, 2023) Aslan, Omer; Aktug, Semih Serkant; Ozkan-Okay, Merve; Yilmaz, Abdullah Asim; Akin, ErdalInternet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.

