474 487

Title

Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence

  Mahmoud A. Zaher 1 * ,   Nabil M. Eldakhly 2

1  Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt
    (mahmoud.zaher@eru.edu.eg)

2  Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt
    (nabil.omr@sadatacademy.edu.eg)


Doi   :   https://doi.org/10.54216/IJWAC.060202

Received: September 08, 2022 Accepted: November 03, 2022

Abstract :

A wireless sensor network, also known as a WSN, is made up of thousands of minuscule sensor nodes that are connected to one another in order to monitor, track, and organize data collected in an unattended environment in the most prominent location. Due to its one-of-a-kind qualities, it has, the wireless sensor network is gaining traction in a variety of sectors and put to use in a wide range of applications, including surveillance, healthcare, and industry. These networks exposed to a variety of security flaws and major threats because of their dynamic design and deployment in an unsupervised environment. Cybercriminals prey on individuals who utilize the internet as well as organizations in order to get sensitive information. The hackers were able to access critical data on the company's systems, such as login information, credit card details, and bank account numbers. Phishing attacks are a sort of cyberattack in which hackers trick internet users into believing their websites are authentic in order to collect the users' private information. The purpose of these attacks is to steal this information. Malware assaults begin with the covert installation of malicious software on corporate servers or user PCs via the use of the internet. The attackers then continue to steal every piece of information that kept on the targeted server or computer. Malware used in an ever-increasing number of attacks these days. An incursion into a network is a kind of attack in which the perpetrator seeks to take possession of all of the network's resources. Approaches based on heuristic analysis and visual resemblance used, regardless of whether they are blacklisted or whitelisted.

Keywords :

Cyber-Attacks; Intrusion Detection System; HTTP Sites; Attackers.

References :

[1] SomaiyaVidyaviharet.all, Phishing Website Detection using Machine Learning,IJCA, Volume 181-

No.23,October 2018.

[2] Sadeh N, Tomasic A, Fette I. Learning to detect phishing emails. Proceedings of the16th

international conference on World Wide Web. 2007: p. 649-656

[3] AndrBergholz, Gerhard Paa, Frank Reichartz, Siehyun Strobili, and SchloBirlinghoven. Improved

phishing detection usingmodel-based features. In FifthConference on Email and Anti-Spam, CEAS,

2008

[4] UCI Machine Learning Repository.” http://archive.ics.uci.edu/ml/, 2012.

[5] H. A. Chip man, E. I. George, and R. E. McCulloch.BART: Bayesian AdditiveRegression Trees.

Journal of the Royal Statistical Society, 2006. Ser.B,Revised.

[6] S. Nawafleh, W. Hadi (2012). Multi-class associative classification to predictingphishing websites.

International Journal of Academic Research Part A; 2012;4(6),302-306J. Clerk Maxwell, A Treatise

on Electricity and Magnetism, 3rd ed., vol. 2.Oxford: Clarendon, 1892, pp.68–73.

[7] P. Tiwari, R. Singh International Journal of Engineering Research &Technology (IJERT) ISSN:

2278-0181Vol. 4 Issue 12, December-2015.

[8] J. P. Marques de Sa. Pattern Recognition: Concepts,Methods and Applications. Springer, 2001.

[9] D. Michie, D. J. Spiegelhalter, and C. C. Taylor. Machine Learning, Neural and Statistical

Classication. Ellis Horwood, 1994.

[10] L. Breiman. Random forests. Machine Learning,45(1):5{32, October2001

[11] Mrs. Sayantani Ghosh, Mr. Sudipta Roy, Prof. Samir K.Bandyopadhyay, “A tutorial review on Text

Mining Algorithms”.

[12] Mauro Ribeiro, Katarina Grolinger, and Miriam AM Capretz. 2015. Mlaas: Machine

a. learning as a service. In Proceedings of the 2015 IEEE 14th International Conference on

b. Machine Learning and Applications (ICMLA). IEEE, Miami, FL, USA, 896–902.

[13] Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes.

2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on

Machine Learning Models. In Proceedings of the 26th Annual Network and Distributed System

Security Symposium (NDSS). IEEE, San Diego, California, USA, 1–15.

[14] Ferdinando S Samaria and Andy C Harter. 1994. Parameterisation of a stochastic model for human

face identification. In Proceedings of the Second IEEE Workshop on Applications of Computer

Vision. IEEE, Sarasota, FL, USA, 138–142.

[15] AMAZON ML SERVICES. 2019. Amazon aws Machine Learning.

https://aws.amazon.com/machine-learning/

[16] Snehkumar Shahani, Jibi Abraham, and R Venkateswaran. 2017. Distributed Data Aggregation with

Privacy Preservation at Endpoint. In Proceedings of the IEEE International Conference on

Management of Data. IEEE, Chennai, India, 1–9.

[17] Richard Shay, SarangaKomanduri, Adam L Durity, Phillip Seyoung Huh, Michelle L Mazurek, Sean

M Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2014. Can long

passwords be secure and usable?. In Proceedings of the SIGCHI Conference on Human Factors in

Computing Systems. ACM, Toronto, ON, Canada, 2927–2936.

[18] Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the

22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Denver,

Colorado, USA, 1310–1321.

[19] Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference

attacks against machine learning models. In Proceedings of the 2017 IEEE Symposium on Security

and Privacy (SP). IEEE, San Jose, CA, USA, 3–18.

[20] Amit Kumar Sikder, Hidayet Aksu, and A SelcukUluagac. 2017. 6thsense: A context-aware sensorbased

attack detector for smart devices. In Proceedings of the 26th USENIX Security Symposium

(USENIX Security 17). USENIX Association, Vancouver, BC, Canada, 397–414.

[21] Tom W Smith, Peter Marsden, Michael Hout, and Jibum Kim. 2012. The General social surveys.

Technical Report. National Opinion Research Center at the University of Chicago

[22] Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, and Stefan Mangard. 2018. ProcHarvester: Fully

automated analysis of procfs side-channel leaks on Android. In Proceedings of the 2018 on Asia

Conference on Computer and Communications Security (AsiaCCS). ACM, Incheon, Republic of

Korea, 749–763.

[23] NedimSrndic and Pavel Laskov. 2014. Practical evasion of a learning-based classifier: A case study.

In Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA,

USA, 197-211

[24] Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer:

Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32 (2012),

323–332.

[25] Jingchao Sun, XiaocongJin, Yimin Chen, Jinxue Zhang, Yanchao Zhang, and Rui Zhang. 2016.

VISIBLE: Video-assisted keystroke inference from tablet backside motion. In Proceedings of the

23rd Annual Network and Distributed System Security Symposium (NDSS). IEEE, San Diego, CA,

USA


Cite this Article as :
Style #
MLA Mahmoud A. Zaher, Nabil M. Eldakhly. "Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence." International Journal of Wireless and Ad Hoc Communication, Vol. 6, No. 2, 2023 ,PP. 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)
APA Mahmoud A. Zaher, Nabil M. Eldakhly. (2023). Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)
Chicago Mahmoud A. Zaher, Nabil M. Eldakhly. "Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence." Journal of International Journal of Wireless and Ad Hoc Communication, 6 no. 2 (2023): 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)
Harvard Mahmoud A. Zaher, Nabil M. Eldakhly. (2023). Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)
Vancouver Mahmoud A. Zaher, Nabil M. Eldakhly. Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. Journal of International Journal of Wireless and Ad Hoc Communication, (2023); 6 ( 2 ): 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)
IEEE Mahmoud A. Zaher, Nabil M. Eldakhly, Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 6 , No. 2 , (2023) : 18-33 (Doi   :  https://doi.org/10.54216/IJWAC.060202)