A SSDF Attack Detection Algorithm Based on Integration Learning and Deep Learning

Authors

  • Xiaojuan Bai
  • Jing Xu
  • Shenghui Wang

DOI:

https://doi.org/10.62051/ijcsit.v5n3.07

Keywords:

SSDF, Spectrum sensing, Ensemble learning, Deep learning, Accuracy

Abstract

Spectrum sensing data falsification (SSDF) attacks are one of the most serious security threats in collaborative spectrum sensing models. In order to deal with SSDF attacks, an attack detection algorithm combining ensemble learning and deep learning is proposed. The algorithm uses soft voting mechanism to integrate the advantages of traditional integrated learning methods of support vector machine (SVM), decision tree and random forest, fully mining the features of the data, combined with the powerful automatic feature extraction capability of deep learning, to achieve accurate detection of SSDF attacks. At the same time, the multi-mode hybrid attack training and detection system can enhance the detection accuracy through continuous optimization, and improve the flexibility and reliability of the system in practical application. Experiments show that the proposed algorithm can effectively identify SSDF attack behavior, perform stably under different attack scenarios, and have strong robustness, which can effectively guarantee the security of spectrum sensing system.

Downloads

Download data is not yet available.

References

[1] Akyildiz I F, Lo B F, Balakrishnan R. Cooperative spectrum sensing in cognitive radio networks: A survey [J]. Physical communication, 2011, 4(1): 40-62. https://doi.org/10.1016/j.phycom.2010.12.003

[2] Kaligineedi P, et al. Bayesian detection of malicious users in collaborative spectrum sensing [J]. IEEE Transactions on Wireless Communications, 2012. https://doi.org/10.1109/ACCESS.2017.2756992

[3] Li Y, Peng Q. Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning [C]//MILCOM 2016-2016 IEEE Military Communications Conference. IEEE, 2016: 174-179. https://doi.org/10.1109/MILCOM.2016.7795321

[4] Sarmah R, Taggu A, Marchang N. Detecting Byzantine attack in cognitive radio networks using machine learning [J]. Wireless Networks, 2020, 26(8): 5939-5950. https://doi.org/10.1007/s11276-020-02398-w

[5] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition [J]. arXiv preprint arXiv:1409.1556, 2014. https://doi.org/10.48550/arXiv.1409.1556

[6] Cortes C, Vapnik V. Support-vector networks [J]. Machine learning, 1995, 20: 273-297. https://doi.org/10.1007/BF00994018

[7] Hastie T, Tibshirani R, Friedman J H, et al. The elements of statistical learning: data mining, inference, and prediction [M]. New York: springer, 2009. https://doi.org/10.1007/978-0-387-21606-5

[8] Omer G, Mutanga O, Abdel-Rahman E M, et al. Performance of support vector machines and artificial neural network for mapping endangered tree species using WorldView-2 data in Dukuduku forest, South Africa [J]. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2015, 8(10): 4825-4840. https://doi.org/10.1109/JSTARS.2015.2461136

[9] Keerthi S S, Lin C J. Asymptotic behaviors of support vector machines with Gaussian kernel [J]. Neural computation, 2003, 15(7): 1667-1689. https://doi.org/10.1162/089976603321891855

[10] Wang S, Zhang J, Fu Y, et al. ACM transactions on intelligent systems and technology [C]//ACM Transactions on Intelligent Systems and Technology. 2011. https://doi.org/10.1145/1961189.1961199

[11] Quinlan J R. Induction of decision trees [J]. Machine learning, 1986, 1: 81-106. https://doi.org/10.1007/BF00116251

[12] Loh W Y. Classification and regression trees [J]. Wiley interdisciplinary reviews: data mining and knowledge discovery, 2011, 1(1): 14-23. https://doi.org/10.1002/widm.8

[13] Breiman L. Random forests [J]. Machine learning, 2001, 45: 5-32. https://doi.org/10.1023/A:1010933404324

[14] LeCun Y, Bengio Y, Hinton G. Deep learning [J]. nature, 2015, 521(7553): 436-444. https://doi.org/10.1038/nature14539

[15] Sokolova M, Lapalme G. A systematic analysis of performance measures for classification tasks [J]. Information processing & management, 2009, 45(4): 427-437. https://doi.org/10.1016/j.ipm.2009.03.002

[16] Fawcett T. An introduction to ROC analysis [J]. Pattern recognition letters, 2006, 27(8): 861-874. https://doi.org/10.1016/j.patrec.2005.10.010

Downloads

Published

10-04-2025

Issue

Section

Articles

How to Cite

Bai, X., Xu, J., & Wang, S. (2025). A SSDF Attack Detection Algorithm Based on Integration Learning and Deep Learning. International Journal of Computer Science and Information Technology, 5(3), 69-82. https://doi.org/10.62051/ijcsit.v5n3.07