Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines

نویسندگان

چکیده

This article presents a framework for converting wireless signals into structured datasets, which can be fed machine learning algorithms the detection of active eavesdropping attacks at physical layer. More specifically, communication system, consists an access point (AP), K legitimate users and eavesdropper, is considered. To detect eavesdropper who breaks system during authentication phase, we first build datasets based on different features then apply sophisticated support vector (SVM) classifiers to those datasets. more specific, process received by AP define pair statistical post-processing signals. By arranging simulate entire transmission constructing features, form so-called artificial training data (ATD). SVM ATD, classify associated with nonattacks, thereby detecting presence eavesdropper. Two are considered, including classic twin-class (TC-SVM) single-class (SC-SVM). While TC-SVM preferred in case having perfect channel state information (CSI) all channels, SC-SVM realistic scenario when have only CSI users. We also evaluate accuracy trained models depending choice kernel functions, eavesdropper's power. Our numerical results show that careful parameter-tuning required exceeding probability 95%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poisoning Attacks against Support Vector Machines

We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such attacks inject specially crafted training data that increases the SVM’s test error. Central to the motivation for these attacks is the fact that most learning algorithms assume that their training data comes from a natural or well-behaved distribution. However, this assumption does not generally hold in sec...

متن کامل

Robust Support Vector Machines for Anomaly Detection in Computer Security

Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in...

متن کامل

STAGE-DISCHARGE MODELING USING SUPPORT VECTOR MACHINES

Establishment of rating curves are often required by the hydrologists for flow estimates in the streams, rivers etc. Measurement of discharge in a river is a time-consuming, expensive, and difficult process and the conventional approach of regression analysis of stage-discharge relation does not provide encouraging results especially during the floods. P

متن کامل

Active-Set Methods for Support Vector Machines

This chapter describes an active-set algorithm for the solution of quadratic programming problems in the context of Support Vector Machines (SVMs). Most of the common SVM optimizers implement working-set algorithms like the SMO method because of their ability to handle large data sets. Although they show generally good results, they may perform weakly in some situations, e.g., if the problem is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3059648