Computer Security Handbook
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Learning from data with localized regression and differential evolution
Learning from data with localized regression and differential evolution
Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series)
Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series)
Self-Defending Networks: The Next Generation of Network Security
Self-Defending Networks: The Next Generation of Network Security
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Learning from Data: Concepts, Theory, and Methods
Learning from Data: Concepts, Theory, and Methods
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Radio frequency fingerprinting commercial communication devices to enhance electronic security
International Journal of Electronic Security and Digital Forensics
Application of evolutionary algorithms in detection of SIP based flooding attacks
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
IMAD: in-execution malware analysis and detection
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Improved wireless security for GMSK-based devices using RF fingerprinting
International Journal of Electronic Security and Digital Forensics
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Malware detection based on dependency graph using hybrid genetic algorithm
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
RF-DNA Fingerprinting for Airport WiMax Communications Security
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
Hi-index | 0.00 |
Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorized WAP access and improve network security. This is done using Differential Evolution (DE) to optimize the performance of a "Learning from Signals" (LFS) classifier implemented with RF "Distinct Native Attribute" (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identical classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DE-optimized LFS classifier with TD features is superior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.