Skip to main content
Erschienen in: Telecommunication Systems 2/2018

30.05.2017

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

verfasst von: Yaser Jararweh, Haythem A. Bany Salameh, Abdallah Alturani, Loai Tawalbeh, Houbing Song

Erschienen in: Telecommunication Systems | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several new attacks have been identified in CRNs such as primary user emulation, dynamic spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact network performance, specially in terms of the over all achieved network throughput. In response to that, intrusion detection system (IDS) based on anomaly and signature detection is recognized as an effective candidate solution to handle and mitigate these types of attacks. In this paper, we present an intrusion detection system for CRNs (CR-IDS) using the anomaly-based detection (ABD) approach. The proposed ABD algorithm provides the ability to effectively detect the different types of CRNs security attacks. CR-IDS contains different cooperative components to accomplish its desired functionalities which are monitoring, feature generation and selection, rule generation, rule based system, detection module, action module, impact analysis and learning module. Our simulation results show that CR-IDS can detect DSA attacks with high detection rate and very low false negative and false positive probabilities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bany Salameh, H., Kasasbeh, H., & Harb, B. (2016). A batch-based MAC design with simultaneous assignment decisions for improved throughput in guard-band-constrained cognitive networks. IEEE Transactions on Communications, 64(3), 1143–1152.CrossRef Bany Salameh, H., Kasasbeh, H., & Harb, B. (2016). A batch-based MAC design with simultaneous assignment decisions for improved throughput in guard-band-constrained cognitive networks. IEEE Transactions on Communications, 64(3), 1143–1152.CrossRef
2.
Zurück zum Zitat Bany Salameh, H. (2016). Efficient resource allocation for multi-cell heterogeneous cognitive networks with varying spectrum availability. IEEE Transactions on Vehicular Technology, 65(8), 6628–6635.CrossRef Bany Salameh, H. (2016). Efficient resource allocation for multi-cell heterogeneous cognitive networks with varying spectrum availability. IEEE Transactions on Vehicular Technology, 65(8), 6628–6635.CrossRef
3.
Zurück zum Zitat Parvin, S., Hussain, F., Hussain, O., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.CrossRef Parvin, S., Hussain, F., Hussain, O., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691–1708.CrossRef
4.
Zurück zum Zitat Zargar, S. T., Weiss, M. B. H., Caicedo, C. E., & Joshi, J. B. D. (2009). Security in dynamic spectrum access systems: A Survey. In Telecommunications policy research conference Arlington. Zargar, S. T., Weiss, M. B. H., Caicedo, C. E., & Joshi, J. B. D. (2009). Security in dynamic spectrum access systems: A Survey. In Telecommunications policy research conference Arlington.
5.
Zurück zum Zitat Newman, T., Clancy, T., McHenry, M., & Reed, J. (2010). Case study: Security analysis of a dynamic spectrum access radio system. In IEEE global communications conference. Newman, T., Clancy, T., McHenry, M., & Reed, J. (2010). Case study: Security analysis of a dynamic spectrum access radio system. In IEEE global communications conference.
6.
Zurück zum Zitat Zhang, X., & Li, C. (2009). The security in cognitive radio networks: A survey. IWCMC’09, Leipzig. Zhang, X., & Li, C. (2009). The security in cognitive radio networks: A survey. IWCMC’09, Leipzig.
7.
Zurück zum Zitat Holcomb, S., & Rawat, D. B. (2016). Recent security issues on cognitive radio networks: A survey. SoutheastCon 2016 (pp. 1–6). Norfolk. Holcomb, S., & Rawat, D. B. (2016). Recent security issues on cognitive radio networks: A survey. SoutheastCon 2016 (pp. 1–6). Norfolk.
8.
Zurück zum Zitat Liu, S., Chen, Y., Trappe, W., & Greenstein, L. (2009). ALDO: An anomaly detection framework for dynamic spectrum access networks. In The IEEE Infocom conference. Liu, S., Chen, Y., Trappe, W., & Greenstein, L. (2009). ALDO: An anomaly detection framework for dynamic spectrum access networks. In The IEEE Infocom conference.
9.
Zurück zum Zitat Clancy, T., & Goergen, N. (2008). Security in cognitive radio networks: Threats and mitigation. In Conference on cognitive radio oriented wireless networks and communications. Clancy, T., & Goergen, N. (2008). Security in cognitive radio networks: Threats and mitigation. In Conference on cognitive radio oriented wireless networks and communications.
10.
Zurück zum Zitat Al-Nashif, Y., Kumar, A., Hariri, S., Luo, Y., Szidarovsky, F., & Qu, G. (2008). Multi-level intrusion detection system (ML-IDS). In The 5th IEEE international conference on autonomic computing (ICAC’08). Al-Nashif, Y., Kumar, A., Hariri, S., Luo, Y., Szidarovsky, F., & Qu, G. (2008). Multi-level intrusion detection system (ML-IDS). In The 5th IEEE international conference on autonomic computing (ICAC’08).
11.
Zurück zum Zitat Chen, R., Park, J.-M., & Reed, J. (2007). Defense against primary user emulation attacks in cognitive radio networks. In National science foundation under grants CNS-0627436 and CNS-0716208. Chen, R., Park, J.-M., & Reed, J. (2007). Defense against primary user emulation attacks in cognitive radio networks. In National science foundation under grants CNS-0627436 and CNS-0716208.
12.
Zurück zum Zitat Federal Communications Commission. (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices. In Below 900 MHz in the 3GHz band, ET Docket. Federal Communications Commission. (2004). Unlicensed operation in the TV broadcast bands and additional spectrum for unlicensed devices. In Below 900 MHz in the 3GHz band, ET Docket.
13.
Zurück zum Zitat Wu, Y., Wang, B., & Liu, K. (2010). Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. In IEEE globecom conference. Wu, Y., Wang, B., & Liu, K. (2010). Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. In IEEE globecom conference.
14.
Zurück zum Zitat Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414–436.CrossRef Hlavacek, D., & Chang, J. M. (2014). A layered approach to cognitive radio network security: A survey. Computer Networks, 75, 414–436.CrossRef
15.
Zurück zum Zitat Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and Countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17 (2), 1023–1043. Second quarter 2015. Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and Countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17 (2), 1023–1043. Second quarter 2015.
16.
Zurück zum Zitat Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 2015(1), 1–14.CrossRef Marinho, J., Granjal, J., & Monteiro, E. (2015). A survey on security attacks and countermeasures with primary user detection in cognitive radio networks. EURASIP Journal on Information Security, 2015(1), 1–14.CrossRef
17.
Zurück zum Zitat Khasawneh, M., & Agarwal, A. (2014). A survey on security in cognitive radio networks. In Proceedings of the 6th international conference on computer science and information technology (CSIT), 2014 (pp. 64–70). IEEE. Khasawneh, M., & Agarwal, A. (2014). A survey on security in cognitive radio networks. In Proceedings of the 6th international conference on computer science and information technology (CSIT), 2014 (pp. 64–70). IEEE.
18.
Zurück zum Zitat Jianwu, L., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.CrossRef Jianwu, L., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.CrossRef
19.
Zurück zum Zitat Ling, M. H., Yau, K.-L. A., & Poh, G. S. (2014). Trust and reputation management in cognitive radio networks: A survey. Security and Communication Networks, 7(11), 2160–2179.CrossRef Ling, M. H., Yau, K.-L. A., & Poh, G. S. (2014). Trust and reputation management in cognitive radio networks: A survey. Security and Communication Networks, 7(11), 2160–2179.CrossRef
20.
Zurück zum Zitat Reddy, Y. (2013). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84–89). Bangkok. Reddy, Y. (2013). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84–89). Bangkok.
21.
Zurück zum Zitat Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387–1398.CrossRef Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387–1398.CrossRef
22.
Zurück zum Zitat Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications, 12(7), 119–126.CrossRef Wengui, S., & Yang, L. (2015). A jury-based trust management mechanism in distributed cognitive radio networks. China Communications, 12(7), 119–126.CrossRef
23.
Zurück zum Zitat Rahman, S. M. M., Kamruzzaman, S. M., Almogren, A., Alelaiwi, A., Alamri, A., & Alghamdi, A. (2014). Anonymous and secure communication protocol for cognitive radio ad hoc networks. In Proceedings of the IEEE international symposium on multimedia (ISM), 2014 (pp. 393–398). IEEE. Rahman, S. M. M., Kamruzzaman, S. M., Almogren, A., Alelaiwi, A., Alamri, A., & Alghamdi, A. (2014). Anonymous and secure communication protocol for cognitive radio ad hoc networks. In Proceedings of the IEEE international symposium on multimedia (ISM), 2014 (pp. 393–398). IEEE.
24.
Zurück zum Zitat Rawat, D. B. (2016). Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In Proceedings of the 2016 IEEE conference on communications and network security (CNS) (pp. 465–471). Philadelphia. Rawat, D. B. (2016). Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In Proceedings of the 2016 IEEE conference on communications and network security (CNS) (pp. 465–471). Philadelphia.
25.
Zurück zum Zitat Ouyang, J., Zhu, W. P., Massicotte, D., & Lin, M. (2016). Energy efficient optimization for physical layer security in cognitive relay networks. In Proceedings of the 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur. Ouyang, J., Zhu, W. P., Massicotte, D., & Lin, M. (2016). Energy efficient optimization for physical layer security in cognitive relay networks. In Proceedings of the 2016 IEEE international conference on communications (ICC) (pp. 1–6). Kuala Lumpur.
26.
Zurück zum Zitat Shim, K., Do, N. T., An, B., & Nam, S. Y. (2016). Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 international conference on electronics, information, and communications (ICEIC) (pp. 1–4). Da Nang. Shim, K., Do, N. T., An, B., & Nam, S. Y. (2016). Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information. In Proceedings of the 2016 international conference on electronics, information, and communications (ICEIC) (pp. 1–4). Da Nang.
27.
Zurück zum Zitat Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference improves PHY security for cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620.CrossRef Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference improves PHY security for cognitive radio networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620.CrossRef
28.
Zurück zum Zitat Sorrells, C., Potier, P., Qian, L., & Li, X. (2011). Anomalous spectrum usage attack detection in cognitive radio wireless networks. In IEEE international conference on technologies for homeland security (HST), 2011 (pp. 384–389). 15–17 Nov. Sorrells, C., Potier, P., Qian, L., & Li, X. (2011). Anomalous spectrum usage attack detection in cognitive radio wireless networks. In IEEE international conference on technologies for homeland security (HST), 2011 (pp. 384–389). 15–17 Nov.
29.
Zurück zum Zitat Blesa, J., Romero, E., Rozas, A., & Araujo, A. (2013). PUE attack detection in CWSNs using anomaly detecttion techniques. EURASIP Journal on Wireless Communications and Networking, 2013(1), 215.CrossRef Blesa, J., Romero, E., Rozas, A., & Araujo, A. (2013). PUE attack detection in CWSNs using anomaly detecttion techniques. EURASIP Journal on Wireless Communications and Networking, 2013(1), 215.CrossRef
30.
Zurück zum Zitat Fragkiadakis, A. G., Siris, V. A., Petroulakis, N. E., & Traganitis, A. P. (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 15, 276–294. Fragkiadakis, A. G., Siris, V. A., Petroulakis, N. E., & Traganitis, A. P. (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, 15, 276–294.
31.
Zurück zum Zitat Fayssal, S., Hariri, S., & Al-Nashif, Y. (2007). Anomaly-based behavior analysis of wireless network security. In Mobile and ubiquitous systems: Networking and services. Fayssal, S., Hariri, S., & Al-Nashif, Y. (2007). Anomaly-based behavior analysis of wireless network security. In Mobile and ubiquitous systems: Networking and services.
32.
Zurück zum Zitat Fayssal, S., Al-Nashif, Y., Uk Kim, B., & Hariri, S. (2008). A proactive wireless self-protection system. In The 5th ACM international conference on pervasive services. Fayssal, S., Al-Nashif, Y., Uk Kim, B., & Hariri, S. (2008). A proactive wireless self-protection system. In The 5th ACM international conference on pervasive services.
33.
Zurück zum Zitat Fayssal, S., & Hariri, S. (2007). Anomaly-based protection approach against wireless network attacks. In IEEE international conference on pervasive services. Fayssal, S., & Hariri, S. (2007). Anomaly-based protection approach against wireless network attacks. In IEEE international conference on pervasive services.
34.
Zurück zum Zitat Doulat, A., Al Abed Al Aziz, A., Al-Ayyoub, M., Jararweh, Y., Bany Salameh, H. A., & Khreishah, A. A. (2014). Software defined framework for multi-cell cognitive radio networks. In 2014 IEEE 10th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 513–518). Larnaca. Doulat, A., Al Abed Al Aziz, A., Al-Ayyoub, M., Jararweh, Y., Bany Salameh, H. A., & Khreishah, A. A. (2014). Software defined framework for multi-cell cognitive radio networks. In 2014 IEEE 10th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 513–518). Larnaca.
35.
Zurück zum Zitat Phuong, T., Hung, L. X., Cho, S. J., Lee, Y. K., & gyoung, S. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Berlin: Springer.CrossRef Phuong, T., Hung, L. X., Cho, S. J., Lee, Y. K., & gyoung, S. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Berlin: Springer.CrossRef
36.
Zurück zum Zitat Le’on, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633–652. Le’on, O., Hernandez-Serrano, J., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communication Systems, 23(5), 633–652.
37.
Zurück zum Zitat Abraham, A. (2005). Rule-based expert systems. In P. H. Sydenham & R. Thorn (Eds.), Handbook of measuring system design. Hoboken: Wiley. Abraham, A. (2005). Rule-based expert systems. In P. H. Sydenham & R. Thorn (Eds.), Handbook of measuring system design. Hoboken: Wiley.
38.
Zurück zum Zitat Garca-Teodoro, P., Daz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2008). Anomaly-based network intrusion detection: Techniques, systems and challenges. Science Direct, Computer and Security, 28(1), 18–28. Garca-Teodoro, P., Daz-Verdejo, J., Macia-Fernandez, G., & Vazquez, E. (2008). Anomaly-based network intrusion detection: Techniques, systems and challenges. Science Direct, Computer and Security, 28(1), 18–28.
39.
40.
Zurück zum Zitat Eskin, E., Arnold, A., Prerau, M., Portony, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Data mining for security applications. Eskin, E., Arnold, A., Prerau, M., Portony, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Data mining for security applications.
41.
Zurück zum Zitat Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S. (2009). A game theory based risk and impact analysis method for intrusion defense systems. In IEEE/ACS international conference on computer systems and applications. Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S. (2009). A game theory based risk and impact analysis method for intrusion defense systems. In IEEE/ACS international conference on computer systems and applications.
42.
Zurück zum Zitat Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the 2nd international workshop on critical information infrastructures security, Malaga. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the 2nd international workshop on critical information infrastructures security, Malaga.
43.
Zurück zum Zitat Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Araujo, J. (2008). Automated reaction based on risk analysis and attackers skills in intrusion detection systems. In Third international conference on risks and security of internet and systems, 2008. CRiSIS’08 (pp. 117–124). IEEE. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Araujo, J. (2008). Automated reaction based on risk analysis and attackers skills in intrusion detection systems. In Third international conference on risks and security of internet and systems, 2008. CRiSIS’08 (pp. 117–124). IEEE.
Metadaten
Titel
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
verfasst von
Yaser Jararweh
Haythem A. Bany Salameh
Abdallah Alturani
Loai Tawalbeh
Houbing Song
Publikationsdatum
30.05.2017
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 2/2018
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-017-0329-9

Weitere Artikel der Ausgabe 2/2018

Telecommunication Systems 2/2018 Zur Ausgabe

Neuer Inhalt