Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security
نویسندگان
چکیده
The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. SS7 by design neither secures the communication channel nor verifies entire peers. used in telecommunications deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence illegitimate message filtering mechanism, configuration home routing Attackers can take advantage these exploit them impose threats such as subscriber or data disclosure, intercept mobile traffic, perform account frauds, track deny services. Existing methods are unable identify suspicious hosts they use minimal number parameters. So, there is vital need overcome detect abnormal behaviour users hence mitigate security attacks network. This research proposes model for anomaly detection networks Rule-based with stateful correlation. performance proposed method evaluated using synthetic datasets. Results show performs 0.37% better terms attack rate, 24.25% false alarm 31.45% true positive rate when compared existing pattern recognition Artificial Neural Network (ANN) algorithm.
منابع مشابه
SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
Voice over IP (VoIP) services have become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming attractive targets for attackers to steal private informati...
متن کاملA Text Mining-based Anomaly Detection Model in Network Security
Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the performance c...
متن کاملEnhancing Security Event Management Systems with Unsupervised Anomaly Detection
Security Information and Event Management (SIEM) systems are today a key component of complex enterprise networks. They usually aggregate and correlate events from different machines and perform a rule-based analysis to detect threats. In this paper we present an enhancement of such systems which makes use of unsupervised anomaly detection algorithms without the need for any prior training of t...
متن کاملNetwork Payload-based Anomaly Detection and Content-based Alert Correlation
Network Payload-based Anomaly Detection and Content-based Alert Correlation
متن کاملModel-Based Anomaly Detection on Network Services
The key hypothesis to anomaly detection assumes anomalous behaviors are suspicious from a normality point of view. This work provides a new perspective, network service, to model network activity for detecting anomalies. Past models often suffer from lacking of model normality verification, only including particular behavior aspect, and focusing on individual model. To confront them, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2022
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2022.020598