Study on Traffic Anomaly Detection of Wireless Communication Network Based on Fuzzy Relation Equation
DOI:
https://doi.org/10.13052/jcsm2245-1439.1364Keywords:
Fuzzy relation equation, Wireless communication, Network traffic, Anomaly detection, Cluster federation learningAbstract
As the core technology of intrusion detection system, network abnormal traffic detection has always been an important research direction in academia and industry. Related studies show that the failure to find the abnormal situation in the network in time will cause incalculable damage to the computer system and even the whole network. With the emergence of large-scale lightweight terminal nodes, whose characteristics of low computing power and continuous data collection, a distributed abnormal traffic detection technology has emerged. As a kind of distributed structure with decentralized data, federated learning can not only protect local data privacy, reduce communication overhead, but also achieve the effect of centralized training, However, in the era of the Internet of Things with heterogeneous network integration and regular access of massive terminals, the network traffic distribution of different devices is differentiated due to the different security needs of diversified terminals. This will lead to the traditional federated learning-based network anomaly traffic detection facing two major challenges, the uneven data distribution leads to the model training cannot be optimized, and the distributed training global model is not suitable for local network anomaly traffic detection. The scheme of this paper showed significant advantages in the performance evaluation of backbone and mission UAVs, achieving an accuracy of 92.47% and 93.01%, respectively. In contrast, the accuracy of the traditional federated learning method is 89.87% and 89.11%, respectively, which is slightly lower than the present scheme. We propose a framework and algorithm for network anomalous traffic detection based on cluster federated learning. Taking the Internet of Vehicles as the background, the security requirements of the devices connected to the Internet of Vehicles are analyzed, and a set of federated learning data sets meeting the distribution of network traffic in practical applications are constructed with the field recognized data set KDDCup99. This paper verifies the excellent performance of the network anomaly traffic detection mechanism based on cluster federated learning in the case of heterogeneous data distribution.
Downloads
References
Yasir Abdullah, R., Mary Posonia, A., and Barakkath Nisha, U. (2022). An Enhanced Anomaly Forecasting in Distributed Wireless Sensor Network Using Fuzzy Model. International Journal of Fuzzy Systems, 24(7), 3327–3347.
Novaes, M. P., Carvalho, L. F., Lloret, J., and Proença, M. L. (2020). Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment. IEEE Access, 8, 83765–83781.
Al-Obeidat, F., and El-Alfy, E. S. (2019). Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols. Personal and Ubiquitous Computing, 23(5), 777–791.
Toliupa, S., Parkhomenko, I., Ziubina, R., Veselska, O., Rajba, S., and Warwas, K. (2022). Detection of abnormal traffic and network intrusions based on multiple fuzzy rules. Procedia Computer Science, 207, 44–53.
Wagan, S. A., Koo, J., Siddiqui, I. F., Qureshi, N. M. F., Attique, M., and Shin, D. R. (2023). A fuzzy-based duo-secure multi-modal framework for IoMT anomaly detection. Journal of King Saud University-Computer and Information Sciences, 35(1), 131–144.
Almotiri, S. H. (2021). Integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. IEEE Access, 9, 10751–10764.
Cisar, P., and Maravic-Cisar, S. (2019). EWMA statistics and fuzzy logic in function of network anomaly detection. Facta universitatis-series: Electronics and Energetics, 32(2), 249–265.
Fu, L., Zhang, W., Tan, X., and Zhu, H. (2021). An algorithm for detection of traffic attribute exceptions based on cluster algorithm in industrial internet of things. IEEE Access, 9, 53370–53378.
Gu, K., Dong, X., and Jia, W. (2020). Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets. IEEE Transactions on Cloud Computing, 10(2), 1215–1232.
Chen, L., Gao, S., Liu, B., Lu, Z., and Jiang, Z. (2020). FEW-NNN: A fuzzy entropy weighted natural nearest neighbor method for flow-based network traffic attack detection. China Communications, 17(5), 151–167.
Fang, L., Li, Y., Liu, Z., Yin, C., Li, M., and Cao, Z. J. (2020). A practical model based on anomaly detection for protecting medical IoT control services against external attacks. IEEE Transactions on Industrial Informatics, 17(6), 4260–4269.
Zhang, S. T., Lin, X. B., Wu, L., Song, Y. Q., Liao, N. D., and Liang, Z. H. (2020). Network traffic anomaly detection based on ML-ESN for power metering system. Mathematical Problems in Engineering, 2020, 1–21.
Peng, Y., Tan, A., Wu, J., and Bi, Y. (2019). Hierarchical edge computing: A novel multi-source multi-dimensional data anomaly detection scheme for industrial Internet of Things. IEEE Access, 7, 111257–111270.
Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. H., Hassan, M. M., Fortino, G., and Choo, K. K. R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences, 497, 77–90.
Hussain, B., Du, Q., and Ren, P. (2018). Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks. China Communications, 15(4), 41–57.
Xu, H., Han, S., Li, X., and Han, Z. (2023). Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Transactions on Wireless Communications, 22(12), 9346–9360.
Garg, S., and Batra, S. (2018). Fuzzified cuckoo based clustering technique for network anomaly detection. Computers & Electrical Engineering, 71, 798–817.
Alzubi, O. A. (2022). A deep learning-based frechet and dirichlet model for intrusion detection in IWSN. Journal of Intelligent & Fuzzy Systems, 42(2), 873–883.
Peng, H., Liu, L., Liu, J., and Lewis, J. R. (2019). Network traffic anomaly detection algorithm using mahout classifier. Journal of Intelligent & Fuzzy Systems, 37(1), 137–144.
Li, Q., Meng, S., Wang, S., Zhang, J., and Hou, J. (2019). CAD: command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access, 7, 34910–34924.
Ali, W. A., Manasa, K. N., Bendechache, M., Fadhel Aljunaid, M., and Sandhya, P. (2020). A review of current machine learning approaches for anomaly detection in network traffic. Journal of Telecommunications and the Digital Economy, 8(4), 64–95.
Arkan, A. S., and Ahmadi, M. (2021). Entropy-based anomaly detection using observation points relations in wireless sensor networks. Wireless Personal Communications, 119(2), 1783–1798.
Revanesh, M., Gundal, S. S., Arunkumar, J. R., Josephson, P. J., Suhasini, S., and Devi, T. K. (2023). Artificial neural networks-based improved Levenberg–Marquardt neural network for energy efficiency and anomaly detection in WSN. Wireless Networks, 1–16.
Salem, O., Alsubhi, K., Mehaoua, A., and Boutaba, R. (2020). Markov models for anomaly detection in wireless body area networks for secure health monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 526–540.
Safara, F., Souri, A., and Serrizadeh, M. (2020). Improved intrusion detection method for communication networks using association rule mining and artificial neural networks. IET Communications, 14(7), 1192–1197.
Yang, L., Lu, Y., Yang, S. X., Zhong, Y., Guo, T., and Liang, Z. (2021). An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks. IEEE Sensors Journal, 21(12), 13935–13947.
Yaqoob, S., Hussain, A., Subhan, F., Pappalardo, G., and Awais, M. (2023). Deep learning based anomaly detection for fog-assisted iovs network. IEEE Access, 11, 19024–19038.
Han, M. L., Kwak, B. I., and Kim, H. K. (2021). Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Transactions on Information Forensics and Security, 16, 2941–2956.
Shang, F., Zhou, D., Li, C., Ye, H., and Zhao, Y. (2019). Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network. Photonic Network Communications, 37, 212–223.
Tripathi, K. N., Yadav, A. M., and Sharma, S. C. (2022). Fuzzy and deep belief network based malicious vehicle identification and trust recommendation framework in VANETs. Wireless Personal Communications, 124(3), 2475–2504.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.