An intrusion is defined as a violation of the security policy of the system, and, hence, intrusion detection mainly refers to the mechanisms that are developed to detect violations of system security policy. Current intrusion detection systems ~IDS! examine all data features to detect intrusion or m
Behavior-Based Intrusion Detection in Mobile Phone Systems
โ Scribed by Azzedine Boukerche; Mirela Sechi M. Annoni Notare
- Publisher
- Elsevier Science
- Year
- 2002
- Tongue
- English
- Weight
- 397 KB
- Volume
- 62
- Category
- Article
- ISSN
- 0743-7315
No coin nor oath required. For personal study only.
โฆ Synopsis
The field of mobile and wireless networking is reemerging amid unprecedented growth in the scale and diversity of computer networking. However, further increases in network security are necessary before the promise of mobile communication can be fulfilled. In this paper, we describe how neural networks and tools can be applied against frauds in analog mobile telecommunication networks. To the best of our knowledge there has been a lot of work done to secure the usage of mobile phones at the hardware level, but very little at the software level. In this paper, we present an on-line security system for fraud detection of impostors and improper use of mobile phone operations based on a neural network (NN) classifier. It acts solely on the recent information and past history of the mobile phone owner activities, and classifies the telephone users into classes according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. As soon as the system identifies a fraud, it notifies both the carrier telecom and the victim about it immediately and not at the end of the monthly bill cycle. In our implementation, we make use of the radial basis function (RBF) model because of its simplicity and its flexibility to adapt to pattern changes, i.e., it encompasses the important characteristic of learning. By learning, a RBF NN can discover some regular patterns and the relation across them, and organize itself for making these associations. As a consequence it is widely used for solving classification and pattern recognition problems. Our results indicate that our system reduces significantly the telecom carriers's profit losses as well
๐ SIMILAR VOLUMES
Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection sys
In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which ea
Using a recurrent neural network technique, we uniformly distribute prototypes over toll tickets, sampled from the U.K. network operator, Vodafone. The prototypes, which continue to adapt to cater for seasonal or long term trends, are used to classify incoming toll tickets to form statistical behavi