Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks
Abstract
:1. Introduction
- Initially, we use a dataset named CSE-CIC-IDS2018 [29] on Amazon Web Service (AWS) for training and testing, which are performed once per iteration. The same training and test data are considered for all models to provide a fair comparison between them. Eighty percent of the dataset is assigned to training set, and 20% is assigned to the test set.
- Model creation can be defined as feature selection, implementation, refinement, and comparison. We propose a 5G satellite-based UAV model. We implemented security based on ML algorithms in gateways. To increase the accuracy of our system model as well as implementing it in the real world, we consider the features that we mention here. Some of the most important features include flow duration, total packets in the forward and backward direction, maximum and minimum size of the packet in the forward and backward direction, average and total size of the packet in forward direction, standard deviation packet size in forward and backward direction, etc. We consider zero (0) for normal and one (1) for attack records.
- In order to provide security in this paper, data packets are encrypted initially, and then ML algorithms are used to increase the level of accuracy of packets to identify which one is the correct packet and which one is fake or attack packet. The ML algorithms such as Logistic Regression (LR), Linear Discriminant Analysis (LDA), KNN, Decision Tree (DT), Gaussian Naive Bayes (GNB), Stochastic Gradient Descent (SGD), and K-mean are used.
- Finally, we compare the output of the above ML algorithms for above-mentioned attacks based on their precision, recall, F1-score parameters, accuracy rate, false-negative rate, correctly classified records, and incorrectly classified records, which will be explained in Section 4.
2. Background and Related Works
2.1. Satellite Architecture
- As mentioned above, the propagation delay between the UE and access node can change significantly, i.e., between 2 ms to 140 ms.
- The need for the 5G core network implies tackling different access capabilities such as propagation delays, coverage, etc., which can satisfy a terrestrial network.
- UEs can utilize the concept of multi-connectivity, which is the capability of supporting simultaneous UEs by multiple sessions that can take advantage of various 3GPP access networks (terrestrial and satellite in the forward and backward direction), as shown in Figure 4.
2.2. Related Works
2.2.1. Related Works for CSE-CIC-IDS2018 Dataset
2.2.2. Recent Public Datasets
3. System Model
- A 5G system supporting satellite access and massive Machine-Type Communications (mMTC) should also support UAV communication based on the 5G-satellite access network.
- A 5G system should have multiple access points including satellite networks and terrestrial access mobile networks, combined with a machine learning based firewall. In 5G Core (5GC), a machine learning-based, intelligent Next Generation Firewall (NGFW) provides protection across all these access points. Thus, NGFW helps to achieve multiple network slices, as shown in Figure 7.
- One of the requirements is the selection of satellite and terrestrial access networks. The selection should be based on operator policy, subscription settings, QoS settings, and security policies.
3.1. UAV Threats and Vulnerability
3.1.1. Man-in-the-Middle (MITM) Attack
3.1.2. Hijacking
3.1.3. Eavesdropping and Spoofing
3.1.4. Denial of Service (DoS)
3.2. 5G Threats
3.2.1. Attacks against Privacy
3.2.2. Attacks against Integrity
3.2.3. Attacks against Availability
3.2.4. Attacks against Authentication
- The softwareized components of the network, i.e., the NFV version of routers, switches, and firewalls, should be integrated with the SDN environment, which enables the monitoring topology types and manages the softwarized devices (NFV functionalities) directly and indirectly via their own element managers.
- SDN controllers have the capability to control the traffic flows and communication between points and to implement the security policy. Additionally, information on the network and the traffic analytics can be collected and processed by the SDN.
- Network security components can be applied through northbound APIs with the SDN controller in order to detect and respond to spoofing DDoS attacks. The advantage of SDN is that it can efficiently detect the DoS attacks and achieve optimal network wide effectiveness; however, it enforces overhead to the network access as well as overhead to network utilization performance.
3.3. Intrusion Detection System
4. ML Approaches to Detect Attacks
- LR Algorithm: This method is applied for binary classification problems with two class values. Logistic regression is widely used to evaluate and explain the relationship between a binary real variable such as success or failure and predictor variables. It uses a logistic function for classification logistic regression. Modeling the mean of the response variable for a given set of predictor variables is one of the significant objectives of this algorithm [62].
- LDA: LDA is a well-known method to reduce and classify the projects that have high-dimensional data and create low-dimensional space to efficiently obtain a separate maximum class. In fact, an LDA classifier linearly combines original features. By simultaneously minimizing the samples of a class distance and maximizing distance between class categories, optimal design in LDA algorithm can be achieved [63].
- KNN: For both classification and regression objectives, KNN is an ideal choice in predictive problems. However, most of its applications are related to classification problems in the industry. It has three prominent benefits, including easy interpretation of output, predictive power, and calculation time. The classification is done based on the majority of neighbors of the considered case. This means the case is assigned to the class where the most similarities are observed among its K nearest neighbors, calculated using a distance function.
- DT: In DT, a decision-making method is used that is a tree-like model of the decisions and their potential outcomes that helps to reach a goal. In a DT classifier, a collection of test questions and conditions are designed in a tree shape. The internal nodes in DT include test conditions to divide records, which have different features. A class label including success or failure is assigned to all the terminal nodes. Then, DT recursively selects the best features to separate the data and develops the clusters as the leaf nodes of the tree until its iteration criterion is met. When the decision tree is built, a tree-pruning step can be applied to decrease the size of the decision tree. A decision tree model with many branches and leaves that is too large is known as overfitting [64].
- GNB: Another classification algorithm for binary (two-class) data is Naive Bayes, which is appropriate for multi-class classification problems. Initially, the Gaussian Naive Bayes classifier specifies the total number of classes and then computes the conditional probability for each dataset class. Then, for each feature, the conditional probability can be calculated.
- SGD: A stochastic gradient descent algorithm uses regularized linear models with stochastic gradient descent. In an SGD method, one random point is considered while changing weights, in contrast to gradient descent, which takes into account all of the training data. When there is a huge number of datasets, stochastic gradient descent is the faster choice than gradient descent.
- K-M: K-means clustering is classified as unsupervised learning, and it is used when data are unlabeled, such as data without definite categories or groups. The initial goal of this classifier is to find a cluster in the whole data that the number of clusters represents the variable named K. The algorithm iteratively performs until each data point is assigned to one of K clusters according to the features that are considered. In conclusion, data points are clustered based on the similarities that exist between features.
5. Experimental Results
5.1. Experimental Setup
- True Positive (TP): A TP rate shows the number of attack packets that are correctly classified as attacks.
- True Negative (TN): The number of normal packets that correctly classified as normal packets is known as the TN rate.
- False Negative (FN): FN is an incorrect classification where the attack packets are considered normal packets. The FN rate will increase when the number of attack packets that are incorrectly classified as normal packets grows, such it will be anticipated that a serious problem occurs in network resources in terms of confidentiality and availability.
- False Positive (FP): FP refers to when the normal packets are incorrectly classified as the attack packets. The value of FP will grow, which leads to an increase in the computation time. Clearly, the effect of this incorrect classification is less harmful than increasing the FN value.
5.2. Results
6. Discussion
- The DT reached the maximum value for accuracy rate compared to all other types of ML classifiers, as indicated by the yellow bar shown in Figure 11. It obtains a 99.99% accuracy rate for Botnet, Brute force, DoS, DDoS, and Web attacks. DT has the lowest false negative rate value of 0.001%, as shown in Figure 11. KNN had second highest accuracy rate in detecting different types of attacks, as indicated by the gray bar. The accuracy rate of KNN is slightly less than that of DT classifier. On the other hand, GNB has the worst accuracy in detecting all types of attacks. The GNB algorithm shows the lowest average accuracy rate of 20.19% with the smallest precision value of 0.001.
- The precision of DT is pretty good in terms of detecting most of the attack types, as can be seen from Figure 12. However, its precision performance is quite lower than that of other ML algorithms in detecting infiltration attack. The GNB classifier precision is lowest among all other ML classifiers. In detecting the DDoS attack, all the machine learning classifiers perform well and have higher precision rates except the GNB classifier.
- The FNR is one of the most important parameters in evaluating the IDS. The lower the FNR, the better it is. In Figure 13, the GNB shows the worst FNR performance in detecting various attacks. The LR and K-means algorithm also performs badly in terms of FNR against various attacks. The K-means performs the worst in detecting DoS attacks, with the highest FNR value of 0.897. Most of the ML algorithms have a higher FNR in the case of infiltration attack; however, K-means performs better than any other ML algorithms, with an FNR value of 0.148.
- Similarly, in the case of F1 Score, the higher value of F1 score represents a lower rate of incorrect classified packets; i.e., higher the F1 score, the better it is. F1 is considered the best when its F1 score is 1, whereas the model is a failure when the F1 score is 0. The DT has the highest F1 score value in detecting various types of attacks. KNN also performs well compared to the DT classifier, while LDA performs slightly lower than DT and KNN. However, K-means and GNB has the lowest F1 score value compared to other ML algorithms, as can be seen in Figure 14.
7. Future Works
8. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Ippolito, L.J. Introduction to Satellite Communications. In Satellite Communications Systems Engineering: Atmospheric Effects, Satellite Link Design and System Performance; Wiley: Hoboken, NJ, USA, 2017; pp. 1–16. [Google Scholar] [CrossRef] [Green Version]
- Seeber, G. Satellite Geodesy: Foundations, Methods, and Applications; Walter de Gruyter: Berlin, Germany, 2008. [Google Scholar]
- Chaisatien, W. The 6 Golden Rules for Digital Transformation Success: Strategies and Insights from Industry Leader; Technical Report; Ericsson: Stockholm, Sweden, 2021. [Google Scholar]
- De Sanctis, M.; Cianca, E.; Araniti, G.; Bisio, I.; Prasad, R. Satellite communications supporting internet of remote things. IEEE Internet Things J. 2016, 3, 113–123. [Google Scholar] [CrossRef]
- Qu, Z.; Zhang, G.; Cao, H.; Xie, J. LEO satellite constellation for internet of things. IEEE Access 2017, 5, 18391–18401. [Google Scholar] [CrossRef]
- Siris, V.A.; Thomas, Y.; Polyzos, G.C. Supporting the iot over integrated satellite-terrestrial networks using information-centric networking. In Proceedings of the 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus, 21–23 November 2016; pp. 1–5. [Google Scholar]
- Chien, W.C.; Lai, C.F.; Hossain, M.S.; Muhammad, G. Heterogeneous Space and Terrestrial Integrated Networks for IoT: Architecture and Challenges. IEEE Netw. 2018, 33, 15–21. [Google Scholar] [CrossRef]
- Chelle, H.; Crosnier, M.; Dhaou, R.; Beylot, A.L. Adaptive load control for IoT based on satellite communications. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–7. [Google Scholar]
- Mukherjee, J.; Ramamurthy, B. Communication technologies and architectures for space network and interplanetary internet. IEEE Commun. Surv. Tutor. 2013, 15, 881–897. [Google Scholar] [CrossRef]
- Giambene, G.; Kota, S.; Pillai, P. Satellite-5G Integration: A Network Perspective. IEEE Netw. 2018, 32, 25–31. [Google Scholar] [CrossRef]
- Boero, L.; Bruschi, R.; Davoli, F.; Marchese, M.; Patrone, F. Satellite Networking Integration in the 5G Ecosystem: Research Trends and Open Challenges. IEEE Netw. 2018, 32, 9–15. [Google Scholar] [CrossRef]
- Curry, T.; Abbas, R. 5G Coverage, Prediction, and Trial Measurements. arXiv 2020, arXiv:2003.09574. [Google Scholar]
- Wang, X.; Du, J.; Wang, J.; Zhang, Z.; Jiang, C.; Ren, Y. Key issues of security in space-based information network review. In Proceedings of the International Conference on Cyberspace Technology (CCT 2014), Beijing, China, 8–10 November 2014; pp. 1–6. [Google Scholar]
- He, D.; Li, X.; Chan, S.; Gao, J.; Guizani, M. Security Analysis of a Space-Based Wireless Network. IEEE Netw. 2018, 33, 36–43. [Google Scholar] [CrossRef]
- Mamdouh, M.; Elrukhsi, M.A.; Khattab, A. Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey. In Proceedings of the 2018 International Conference on Computer and Applications (ICCA), Beirut, Lebanon, 25–26 August 2018; pp. 215–218. [Google Scholar]
- Lam, J.; Abbas, R. Machine Learning based Anomaly Detection for 5G Networks. arXiv 2020, arXiv:2003.03474v1. [Google Scholar]
- Singh, M.; Kim, S. Chapter Four—Blockchain technology for decentralized autonomous organizations. In Role of Blockchain Technology in IoT Applications; Kim, S., Deka, G.C., Zhang, P., Eds.; Elsevier: Amsterdam, The Netherlands, 2019; Volume 115, pp. 115–140. [Google Scholar] [CrossRef]
- Singh, M.; Kim, S. Branch based blockchain technology in intelligent vehicle. Comput. Netw. 2018, 145, 219–231. [Google Scholar] [CrossRef]
- Shrestha, R.; Nam, S.Y.; Bajracharya, R.; Kim, S. Evolution of V2X Communication and Integration of Blockchain for Security Enhancements. Electronics 2020, 9, 1338. [Google Scholar] [CrossRef]
- Shrestha, R.; Nam, S.Y. Regional Blockchain for Vehicular Networks to Prevent 51. IEEE Access 2019, 7, 95033–95045. [Google Scholar] [CrossRef]
- Usman, M.; Ahmed, I.; Aslam, M.I.; Khan, S.; Shah, U.A. SIT: A lightweight encryption algorithm for secure internet of things. arXiv 2017, arXiv:1704.08688. [Google Scholar]
- Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
- Shrestha, R.; Han, K.H.; Choi, D.Y.; Han, S.J. A Novel Cross Layer Intrusion Detection System in MANET. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, WA, Australia, 20–23 April 2010; pp. 647–654. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Senouci, S.M.; Feham, M. An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 2013, 6, 1211–1224. [Google Scholar] [CrossRef]
- Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [Google Scholar] [CrossRef]
- Rajasegarar, S.; Leckie, C.; Palaniswami, M. Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 2008, 15, 34–40. [Google Scholar] [CrossRef]
- Doshi, R.; Apthorpe, N.; Feamster, N. Machine learning ddos detection for consumer internet of things devices. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018; pp. 29–35. [Google Scholar]
- Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, H.P. Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 2014, 16, 1996–2018. [Google Scholar] [CrossRef] [Green Version]
- Sharafaldin, I.; Habibi Lashkari, A.; Ghorbani, A.A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy—ICISSP, INSTICC, SciTePress, Funchal, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar] [CrossRef]
- 3GPP. Study on Architecture Aspects for Using Satellite Access in 5G; Technical Specification (TS) 23.737; Release 16; 3rd Generation Partnership Project (3GPP): Nice, France, 2018. [Google Scholar]
- 3GPP. Technical Specification Group Services and System Aspects; Study on Architecture Aspects for Using Satellite Access in 5G [Rel. 17]; Technical Report; 3rd Generation Partnership Project (3GPP): Nice, France, 2019. [Google Scholar]
- Bae, J.; Choi, Y.S.; Kim, J.S.; Chung, M.Y. Architecture and performance evaluation of MmWave based 5G mobile communication system. In Proceedings of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Korea, 22–24 October 2014; pp. 847–851. [Google Scholar]
- Felita, C.; Suryanegara, M. 5G key technologies: Identifying innovation opportunity. In Proceedings of the 2013 International Conference on QiR, Yogyakarta, Indonesia, 25–28 June 2013; pp. 235–238. [Google Scholar]
- Hossain, E.; Hasan, M. 5G cellular: Key enabling technologies and research challenges. arXiv 2015, arXiv:1503.00674. [Google Scholar]
- Zeng, Y.; Wu, Q.; Zhang, R. Accessing from the Sky: A Tutorial on UAV Communications for 5G and Beyond. arXiv 2019, arXiv:1903.05289. [Google Scholar]
- 3GPP. Unmanned Aerial Systems over 5G. In The Mobile Broadband Standard; Technical Report; 3rd Generation Partnership Project (3GPP): Nice, France, 2019. [Google Scholar]
- Shrestha, R.; Bajracharya, R.; Kim, S. 6G Enabled Unmanned Aerial Vehicle Traffic Management: A Perspective. IEEE Access 2021. [Google Scholar] [CrossRef]
- Leevy, J.L.; Khoshgoftaar, T.M. A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data. J. Big Data 2020, 7, 104. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services. Computers 2019, 8, 58. [Google Scholar] [CrossRef] [Green Version]
- Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [Google Scholar] [CrossRef]
- Basnet, R.B.; Shash, R.; Johnson, C.; Walgren, L.; Doleck, T. Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks. J. Internet Serv. Inf. Secur. (JISIS) 2019, 9, 1–17. [Google Scholar]
- D’hooge, L.; Wauters, T.; Volckaert, B.; De Turck, F. Inter-dataset generalization strength of supervised machine learning methods for intrusion detection. J. Inf. Secur. Appl. 2020, 54, 102564. [Google Scholar] [CrossRef]
- KDD. KDD Cup; Technical Report; KDD: Washington, DC, USA, 1999. [Google Scholar]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Kanimozhi, V.; Jacob, T.P. Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express 2019, 5, 211–214. [Google Scholar] [CrossRef]
- Kim, J.; Kim, J.; Kim, H.; Shim, M.; Choi, E. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics 2020, 9, 916. [Google Scholar] [CrossRef]
- Gamage, S.; Samarabandu, J. Deep learning methods in network intrusion detection: A survey and an objective comparison. J. Netw. Comput. Appl. 2020, 169, 102767. [Google Scholar] [CrossRef]
- Zhang, H.; Li, J.L.; Liu, X.M.; Dong, C. Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Future Gener. Comput. Syst. 2021, 122, 130–143. [Google Scholar] [CrossRef]
- Damaševičius, R.; Venčkauskas, A.; Toldinas, J.; Grigaliūnas, Š. Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection. Electronics 2021, 10, 485. [Google Scholar] [CrossRef]
- Yong, B.; Wei, W.; Li, K.C.; Shen, J.; Zhou, Q.; Wozniak, M.; Połap, D.; Damaševičius, R. Ensemble machine learning approaches for webshell detection in Internet of things environments. Trans. Emerg. Telecommun. Technol. 2020, e4085. Available online: https://onlinelibrary.wiley.com/doi/pdf/10.1002/ett.4085 (accessed on 9 April 2021). [CrossRef]
- Hemalatha, J.; Roseline, S.A.; Geetha, S.; Kadry, S.; Damaševičius, R. An Efficient DenseNet-Based Deep Learning Model for Malware Detection. Entropy 2021, 23, 344. [Google Scholar] [CrossRef]
- Erhan, D.; Anarım, E. Boğaziçi University distributed denial of service dataset. Data Brief 2020, 32, 106187. [Google Scholar] [CrossRef]
- Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection. Electronics 2020, 9, 800. [Google Scholar] [CrossRef]
- Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, 11–13 May 2016; pp. 1–6. [Google Scholar]
- Shrestha, R.; Oh, I.; Kim, S. A Survey on Operation Concept, Advancements, and Challenging Issues of Urban Air Traffic Management. Front. Future Transp. Syst. Model. 2021, 1–27. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef] [Green Version]
- Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
- Shrestha, R.; Djuraev, S.; Nam, S.Y. Sybil attack detection in vehicular network based on received signal strength. In Proceedings of the 2014 International Conference on Connected Vehicles and Expo (ICCVE), Vienna, Austria, 3–7 November 2014; pp. 745–746. [Google Scholar] [CrossRef]
- 3GPP. Study on Evolution of Cellular IoT Security for the 5G System; Technical Specification (TS) 33.861; Release 16; 3rd Generation Partnership Project (3GPP): Nice, France, 2018. [Google Scholar]
- Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D. IoT security techniques based on machine learning. arXiv 2018, arXiv:1801.06275. [Google Scholar]
- Banerjee, N.; Giannetsos, T.; Panaousis, E.; Took, C.C. Unsupervised Learning for Trustworthy IoT. In Proceedings of the 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
- Tjur, T. Coefficients of determination in logistic regression models—A new proposal: The coefficient of discrimination. Am. Stat. 2009, 63, 366–372. [Google Scholar] [CrossRef]
- Ye, J. Least squares linear discriminant analysis. In Proceedings of the 24th International Conference on Machine Learning, Corvallis, OR, USA, 20–24 June 2007; pp. 1087–1093. [Google Scholar]
- Tan, P.N.; Steinbach, M.; Kumar, V. Classification: Alternative techniques. In Introduction to Data Mining; Pearson Addison-Wesley: Boston, MA, USA, 2005; pp. 207–315. [Google Scholar]
- Huancayo Ramos, K.S.; Sotelo Monge, M.A.; Maestre Vidal, J. Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics. Sensors 2020, 20, 4501. [Google Scholar] [CrossRef] [PubMed]
- Karatas, G.; Demir, O.; Sahingoz, O.K. Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset. IEEE Access 2020, 8, 32150–32162. [Google Scholar] [CrossRef]
- Fitni, Q.R.S.; Ramli, K. Implementation of Ensemble Learning and Feature Selection for Performance Improvements in Anomaly-Based Intrusion Detection Systems. In Proceedings of the 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Bali, Indonesia, 7–8 July 2020; pp. 118–124. [Google Scholar] [CrossRef]
- Lin, P.; Ye, K.; Xu, C.Z. Dynamic Network Anomaly Detection System by Using Deep Learning Techniques. In Cloud Computing—CLOUD 2019; Da Silva, D., Wang, Q., Zhang, L.J., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 161–176. [Google Scholar]
- Khan, M.A. HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes 2021, 9, 834. [Google Scholar] [CrossRef]
- Ylianttila, M.; Kantola, R.; Gurtov, A.; Mucchi, L.; Oppermann, I.; Yan, Z.; Nguyen, T.H.; Liu, F.; Hewa, T.; Liyanage, M.; et al. 6G White paper: Research challenges for Trust, Security and Privacy. arXiv 2020, arXiv:2004.11665. [Google Scholar]
- Ali, S.; Saad, W.; Rajatheva, N.; Chang, K.; Steinbach, D.; Sliwa, B.; Wietfeld, C.; Mei, K.; Shiri, H.; Zepernick, H.J.; et al. 6G White Paper on Machine Learning in Wireless Communication Networks. arXiv 2020, arXiv:2004.13875. [Google Scholar]
Category | Attack | Number | Train | Test |
---|---|---|---|---|
Botnet | Bot | 286,191 | 838,860 | 209,715 |
Benign | 762,384 | |||
Dos | GoldenEye | 41,508 | 1,677,719 | 419,430 |
Hulk | 461,912 | |||
SlowHTTPTest | 139,890 | |||
Slowloris | 10,990 | |||
Benign | 1,442,849 | |||
Web | Brute Force-Web | 611 | 1,677,720 | 419,430 |
Brute Force-XSS | 230 | |||
SQL Injection | 87 | |||
Benign | 2,096,222 | |||
Infilteration | Infilteration | 161,934 | 755,336 | 188,835 |
Benign | 782,237 | |||
BruteForce | FTP-BruteForce | 193,360 | 838,860 | 209,715 |
SSH-Bruteforce | 187,589 | |||
Benign | 667,626 | |||
DDos | HOIC | 686,012 | 838,860 | 209,715 |
LOIC-UDP | 1730 | |||
Benign | 360,833 |
Confusion Matrix | Prediction | ||
---|---|---|---|
Positive Class | Negative Class | ||
Actual | Normal | TP | FN |
Anomaly | FP | TN |
Botnet | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 88.06% | 0.867 | 0.666 | 0.753 | 0.038 | 184,692 | 25,023 |
LDA | 94.45% | 0.84 | 0.984 | 0.907 | 0.07 | 198,095 | 11,620 |
KNN | 99.99% | 1 | 1 | 1 | 0.00004 | 209,705 | 10 |
DT | 99.99% | 1 | 1 | 1 | 0.00001 | 209,712 | 3 |
GNB | 76.15% | 0.534 | 0.999 | 0.696 | 0.328 | 159,708 | 50,007 |
SGD | 90.30% | 0.901 | 0.726 | 0.804 | 0.03 | 189,386 | 20,329 |
K-M | 61.93% | 0.002 | 0.001 | 0.001 | 0.148 | 129,891 | 79,824 |
Dos | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 87.81% | 0.743 | 0.932 | 0.827 | 0.146 | 368,337 | 51,093 |
LDA | 99.02% | 0.97 | 0.999 | 0.985 | 0.014 | 415,355 | 4075 |
KNN | 99.94% | 0.999 | 1 | 0.999 | 0.001 | 419,210 | 220 |
DT | 99.99% | 1 | 1 | 1 | 0 | 419428 | 2 |
GNB | 76.95% | 0.577 | 0.981 | 0.726 | 0.326 | 322,792 | 96,638 |
SGD | 87.66% | 0.79 | 0.824 | 0.806 | 0.099 | 367,706 | 51,724 |
K-M | 37.67% | 0.331 | 0.982 | 0.496 | 0.897 | 158,004 | 261,426 |
Web | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 99.95% | 0.818 | 0.049 | 0.093 | 0.000005 | 419,254 | 176 |
LDA | 99.71% | 0.067 | 0.421 | 0.116 | 0.003 | 418,253 | 1177 |
KNN | 99.99% | 0.904 | 0.88 | 0.892 | 0.00004 | 419,391 | 39 |
DT | 99.99% | 0.962 | 0.978 | 0.97 | 0.00002 | 419,419 | 11 |
GNB | 20.19% | 0.001 | 0.973 | 0.001 | 0.798 | 84,722 | 334,708 |
SGD | 99.77% | 0 | 0 | 0 | 0.002 | 418,500 | 930 |
K-M | 99.95% | 0 | 0 | 0 | 0.000002 | 419,246 | 184 |
Infiltration | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 82.76% | 0.759 | 0.003 | 0.005 | 0 | 156,292 | 32,543 |
LDA | 82.86% | 0.583 | 0.026 | 0.05 | 0.004 | 156,475 | 32,360 |
KNN | 80.29% | 0.431 | 0.443 | 0.437 | 0.122 | 151,630 | 37,205 |
DT | 86.57% | 0.616 | 0.59 | 0.603 | 0.077 | 163,490 | 25,345 |
GNB | 22.67% | 0.175 | 0.939 | 0.295 | 0.922 | 42,822 | 146,013 |
SGD | 82.53% | 0.231 | 0.005 | 0.01 | 0.003 | 155,860 | 32,975 |
K-M | 74.76% | 0.148 | 0.097 | 0.118 | 0.117 | 141,176 | 47,659 |
BruteForce | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 81.18% | 0.736 | 0.754 | 0.745 | 0.155 | 170,252 | 39,463 |
LDA | 99.77% | 0.994 | 1 | 0.997 | 0.003 | 209,252 | 463 |
KNN | 99.96% | 1 | 1 | 1 | 0 | 209,696 | 19 |
DT | 99.99% | 1 | 1 | 1 | 0 | 209,715 | 1 |
GNB | 59.26% | 0.472 | 1 | 0.641 | 0.64 | 124,283 | 85,432 |
SGD | 88.34% | 0.912 | 0.752 | 0.824 | 0.042 | 185,274 | 24,441 |
K-M | 63.61% | 0 | 0 | 0 | 0 | 133,413 | 76,302 |
DDOS | AR | P | R | F1 | FNR | CC | IC |
---|---|---|---|---|---|---|---|
LR | 99.99% | 1 | 1 | 1 | 0.00001 | 209,714 | 1 |
LDA | 99.99% | 1 | 1 | 1 | 0 | 209,706 | 9 |
KNN | 99.99% | 1 | 1 | 1 | 0.00003 | 209,712 | 3 |
DT | 99.99% | 1 | 1 | 1 | 0 | 209,715 | 1 |
GNB | 99.99% | 1 | 1 | 1 | 0.00006 | 209,710 | 5 |
SGD | 99.98% | 1 | 1 | 1 | 0 | 209,680 | 35 |
K-M | 34.39% | 0.488 | 0.003 | 0.005 | 0.005 | 72,136 | 137,579 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shrestha, R.; Omidkar, A.; Roudi, S.A.; Abbas, R.; Kim, S. Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks. Electronics 2021, 10, 1549. https://doi.org/10.3390/electronics10131549
Shrestha R, Omidkar A, Roudi SA, Abbas R, Kim S. Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks. Electronics. 2021; 10(13):1549. https://doi.org/10.3390/electronics10131549
Chicago/Turabian StyleShrestha, Rakesh, Atefeh Omidkar, Sajjad Ahmadi Roudi, Robert Abbas, and Shiho Kim. 2021. "Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks" Electronics 10, no. 13: 1549. https://doi.org/10.3390/electronics10131549
APA StyleShrestha, R., Omidkar, A., Roudi, S. A., Abbas, R., & Kim, S. (2021). Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks. Electronics, 10(13), 1549. https://doi.org/10.3390/electronics10131549