Abstract
Recently, cyber attacks against national institutional information and communication networks have become increasingly intelligent and advanced. Cyber attacks are becoming a serious threat to a nation’s overall social infrastructure. There have been many studies to evaluate the damage done by cyber attacks. Assessing such damage has been proven to affect not only cyber space problems but also existing warfare fields such as physics, cyberelectronic warfare, and firepower. In this paper, we propose the cyber battle damage assessment framework. The cyber battle damage assessment framework will inform command and control of the damage caused by a cyber attack, and calculate the damage to the equipment and impact on the operation. This framework will assist the commander to understand the current situation, helping to make decisions to lead the operation to succeed. To apply the cyber battle damage assessment framework in a wired/wireless integrated environment, we proposed and tested an unauthorized wireless access point detection algorithm based on a machine learning algorithm on a round trip time value dataset. Overall the K nearest neighbors method showed the highest accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gray, K., Ibanez, L., Aylward, S., et al.: An open source software toolkit for image-guided surgery. Computer 39(4), 46–53 (2006)
Duhoe, K., et al.: Intrusion path prediction system using a tree generation and analysis of attack scenarios. Korean Soc. Internet Inf. (KSII) 17(2), 13–14 (2016)
Sheehan, J., et al.: The military missions and means framework. Army Material Systems Analysis Activity Aberdeen Proving Ground MD, No. AMSAA-TR-756 (2004)
Delbert, J., Rafal, R., Masashi, N.: Cyclones in cyberspace: information shaping and denial in the 2008 Russia-Georgia war. Secur. Dialogue 43(1), 3–24 (2012)
Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: 2011 Proceedings of the 14th International Conference on Information Fusion (FUSION). IEEE, Chicago (2011)
Igor, K., Andrey, C.: A cyber attack modeling and impact assessment framework. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–24. IEEE, Tallinn (2013)
Suman, J., Kasera, K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449–462 (2010)
Hao, H., et al.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)
Alice, E., Gringoli, F., Salgarelli, L.: On the stability of the information carried by traffic flow features at the packet level. ACM SIGCOMM Comp. Commun. Rev. 39(3), 13–18 (2009)
Lanier, W., Beyah, R., Corbett, C.: A passive approach to rogue access point detection. In: IEEE Global Telecommunications Conference, pp. 355–360. IEEE, Washington (2007)
Lizhi, P., et al.: Early stage internet traffic identification using data gravitation based classification. In: 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data. IEEE, Auckland (2016)
Acknowledgements
This work was supported by the Defense Acquisition Program Administration and Agency for Defense Development under the contract UD160066BD.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kim, D., Kim, D., Shin, D., Shin, D., Kim, YH. (2019). Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2018. Lecture Notes in Electrical Engineering, vol 542. Springer, Singapore. https://doi.org/10.1007/978-981-13-3648-5_59
Download citation
DOI: https://doi.org/10.1007/978-981-13-3648-5_59
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3647-8
Online ISBN: 978-981-13-3648-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)