A SSDF Attack Detection Algorithm Based on Integration Learning and Deep Learning
DOI:
https://doi.org/10.62051/ijcsit.v5n3.07Keywords:
SSDF, Spectrum sensing, Ensemble learning, Deep learning, AccuracyAbstract
Spectrum sensing data falsification (SSDF) attacks are one of the most serious security threats in collaborative spectrum sensing models. In order to deal with SSDF attacks, an attack detection algorithm combining ensemble learning and deep learning is proposed. The algorithm uses soft voting mechanism to integrate the advantages of traditional integrated learning methods of support vector machine (SVM), decision tree and random forest, fully mining the features of the data, combined with the powerful automatic feature extraction capability of deep learning, to achieve accurate detection of SSDF attacks. At the same time, the multi-mode hybrid attack training and detection system can enhance the detection accuracy through continuous optimization, and improve the flexibility and reliability of the system in practical application. Experiments show that the proposed algorithm can effectively identify SSDF attack behavior, perform stably under different attack scenarios, and have strong robustness, which can effectively guarantee the security of spectrum sensing system.
Downloads
References
[1] Akyildiz I F, Lo B F, Balakrishnan R. Cooperative spectrum sensing in cognitive radio networks: A survey [J]. Physical communication, 2011, 4(1): 40-62. https://doi.org/10.1016/j.phycom.2010.12.003
[2] Kaligineedi P, et al. Bayesian detection of malicious users in collaborative spectrum sensing [J]. IEEE Transactions on Wireless Communications, 2012. https://doi.org/10.1109/ACCESS.2017.2756992
[3] Li Y, Peng Q. Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning [C]//MILCOM 2016-2016 IEEE Military Communications Conference. IEEE, 2016: 174-179. https://doi.org/10.1109/MILCOM.2016.7795321
[4] Sarmah R, Taggu A, Marchang N. Detecting Byzantine attack in cognitive radio networks using machine learning [J]. Wireless Networks, 2020, 26(8): 5939-5950. https://doi.org/10.1007/s11276-020-02398-w
[5] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition [J]. arXiv preprint arXiv:1409.1556, 2014. https://doi.org/10.48550/arXiv.1409.1556
[6] Cortes C, Vapnik V. Support-vector networks [J]. Machine learning, 1995, 20: 273-297. https://doi.org/10.1007/BF00994018
[7] Hastie T, Tibshirani R, Friedman J H, et al. The elements of statistical learning: data mining, inference, and prediction [M]. New York: springer, 2009. https://doi.org/10.1007/978-0-387-21606-5
[8] Omer G, Mutanga O, Abdel-Rahman E M, et al. Performance of support vector machines and artificial neural network for mapping endangered tree species using WorldView-2 data in Dukuduku forest, South Africa [J]. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015, 8(10): 4825-4840. https://doi.org/10.1109/JSTARS.2015.2461136
[9] Keerthi S S, Lin C J. Asymptotic behaviors of support vector machines with Gaussian kernel [J]. Neural computation, 2003, 15(7): 1667-1689. https://doi.org/10.1162/089976603321891855
[10] Wang S, Zhang J, Fu Y, et al. ACM transactions on intelligent systems and technology [C]//ACM Transactions on Intelligent Systems and Technology. 2011. https://doi.org/10.1145/1961189.1961199
[11] Quinlan J R. Induction of decision trees [J]. Machine learning, 1986, 1: 81-106. https://doi.org/10.1007/BF00116251
[12] Loh W Y. Classification and regression trees [J]. Wiley interdisciplinary reviews: data mining and knowledge discovery, 2011, 1(1): 14-23. https://doi.org/10.1002/widm.8
[13] Breiman L. Random forests [J]. Machine learning, 2001, 45: 5-32. https://doi.org/10.1023/A:1010933404324
[14] LeCun Y, Bengio Y, Hinton G. Deep learning [J]. nature, 2015, 521(7553): 436-444. https://doi.org/10.1038/nature14539
[15] Sokolova M, Lapalme G. A systematic analysis of performance measures for classification tasks [J]. Information processing & management, 2009, 45(4): 427-437. https://doi.org/10.1016/j.ipm.2009.03.002
[16] Fawcett T. An introduction to ROC analysis [J]. Pattern recognition letters, 2006, 27(8): 861-874. https://doi.org/10.1016/j.patrec.2005.10.010
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Computer Science and Information Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







