International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 6 , Issue 2 , PP: 18-33, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence

Mahmoud A. Zaher 1 * , Nabil M. Eldakhly 2

  • 1 Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt - (mahmoud.zaher@eru.edu.eg)
  • 2 Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt - (nabil.omr@sadatacademy.edu.eg)
  • Doi: https://doi.org/10.54216/IJWAC.060202

    Received: September 08, 2022 Accepted: November 03, 2022
    Abstract

    A wireless sensor network, also known as a WSN, is made up of thousands of minuscule sensor nodes that are connected to one another in order to monitor, track, and organize data collected in an unattended environment in the most prominent location. Due to its one-of-a-kind qualities, it has, the wireless sensor network is gaining traction in a variety of sectors and put to use in a wide range of applications, including surveillance, healthcare, and industry. These networks exposed to a variety of security flaws and major threats because of their dynamic design and deployment in an unsupervised environment. Cybercriminals prey on individuals who utilize the internet as well as organizations in order to get sensitive information. The hackers were able to access critical data on the company's systems, such as login information, credit card details, and bank account numbers. Phishing attacks are a sort of cyberattack in which hackers trick internet users into believing their websites are authentic in order to collect the users' private information. The purpose of these attacks is to steal this information. Malware assaults begin with the covert installation of malicious software on corporate servers or user PCs via the use of the internet. The attackers then continue to steal every piece of information that kept on the targeted server or computer. Malware used in an ever-increasing number of attacks these days. An incursion into a network is a kind of attack in which the perpetrator seeks to take possession of all of the network's resources. Approaches based on heuristic analysis and visual resemblance used, regardless of whether they are blacklisted or whitelisted.

    Keywords :

    Cyber-Attacks , Intrusion Detection System , HTTP Sites , Attackers.

    References

    [1]       SomaiyaVidyaviharet.all, Phishing Website Detection using Machine Learning,IJCA, Volume 181-No.23,October 2018.

    [2]        Sadeh N, Tomasic A, Fette I. Learning to detect phishing emails. Proceedings of the16th international conference on World Wide Web. 2007: p. 649-656

    [3]       AndrBergholz, Gerhard Paa, Frank Reichartz, Siehyun Strobili, and SchloBirlinghoven. Improved phishing detection usingmodel-based features. In FifthConference on Email and Anti-Spam, CEAS, 2008

    [4]        UCI Machine Learning Repository.” http://archive.ics.uci.edu/ml/, 2012.

    [5]      H. A. Chip man, E. I. George, and R. E. McCulloch.BART: Bayesian AdditiveRegression Trees. Journal of the Royal Statistical Society, 2006. Ser.B,Revised.

    [6]      S. Nawafleh, W. Hadi (2012). Multi-class associative classification to predictingphishing websites. International Journal of Academic Research Part A; 2012;4(6),302-306J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2.Oxford: Clarendon, 1892, pp.68–73.

    [7]       P. Tiwari, R. Singh International Journal of Engineering Research &Technology (IJERT) ISSN: 2278-0181Vol. 4 Issue 12, December-2015.

    [8]       J. P. Marques de Sa. Pattern Recognition: Concepts,Methods and Applications. Springer, 2001.

    [9]       D. Michie, D. J. Spiegelhalter, and C. C. Taylor. Machine Learning, Neural and Statistical Classication. Ellis Horwood, 1994.

    [10]    L. Breiman. Random forests. Machine Learning,45(1):5{32, October2001

    [11]     Mrs. Sayantani Ghosh, Mr. Sudipta Roy, Prof. Samir K.Bandyopadhyay, “A tutorial review on Text Mining Algorithms”.

    [12]    Mauro Ribeiro, Katarina Grolinger, and Miriam AM Capretz. 2015. Mlaas: Machine learning as a service. In Proceedings of the 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA). IEEE, Miami, FL, USA, 896–902.

    [13]   Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS). IEEE, San Diego, California, USA, 1–15.

    [14]    Ferdinando S Samaria and Andy C Harter. 1994. Parameterisation of a stochastic model for human face identification. In Proceedings of the Second IEEE Workshop on Applications of Computer Vision. IEEE, Sarasota, FL, USA, 138–142. 

    [15]    AMAZON ML SERVICES. 2019. Amazon aws Machine Learning https://aws.amazon.com/machine-learning/

    [16]  Snehkumar Shahani, Jibi Abraham, and R Venkateswaran. 2017. Distributed Data Aggregation with Privacy Preservation at Endpoint. In Proceedings of the IEEE International Conference on Management of Data. IEEE, Chennai, India, 1–9.

    [17]   Richard Shay, SarangaKomanduri, Adam L Durity, Phillip Seyoung Huh, Michelle L Mazurek, Sean M Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2014. Can long passwords be secure and usable?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Toronto, ON, Canada, 2927–2936. 

    [18]    Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Denver, Colorado, USA, 1310–1321.

    [19]   Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 3–18.

    [20]   Amit Kumar Sikder, Hidayet Aksu, and A SelcukUluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, Canada, 397–414. 

    [21]   Tom W Smith, Peter Marsden, Michael Hout, and Jibum Kim. 2012. The General social surveys. Technical Report. National Opinion Research Center at the University of Chicago

    [22]  Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, and Stefan Mangard. 2018. ProcHarvester: Fully automated analysis of procfs side-channel leaks on Android. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (AsiaCCS). ACM, Incheon, Republic of Korea, 749–763. 

    [23]  NedimSrndic and Pavel Laskov. 2014. Practical evasion of a learning-based classifier: A case study. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 197-211

    [24]   Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks 32 (2012), 323–332.

    [25]   Jingchao Sun, XiaocongJin, Yimin Chen, Jinxue Zhang, Yanchao Zhang, and Rui Zhang. 2016. VISIBLE: Video-assisted keystroke inference from tablet backside motion. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS). IEEE, San Diego, CA, USA

    Cite This Article As :
    A., Mahmoud. , M., Nabil. Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2023, pp. 18-33. DOI: https://doi.org/10.54216/IJWAC.060202
    A., M. M., N. (2023). Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. International Journal of Wireless and Ad Hoc Communication, (), 18-33. DOI: https://doi.org/10.54216/IJWAC.060202
    A., Mahmoud. M., Nabil. Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. International Journal of Wireless and Ad Hoc Communication , no. (2023): 18-33. DOI: https://doi.org/10.54216/IJWAC.060202
    A., M. , M., N. (2023) . Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. International Journal of Wireless and Ad Hoc Communication , () , 18-33 . DOI: https://doi.org/10.54216/IJWAC.060202
    A. M. , M. N. [2023]. Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence. International Journal of Wireless and Ad Hoc Communication. (): 18-33. DOI: https://doi.org/10.54216/IJWAC.060202
    A., M. M., N. "Cyber Attack Detection in Wireless Adhoc Network using Artificial Intelligence," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 18-33, 2023. DOI: https://doi.org/10.54216/IJWAC.060202