Skip to main content

Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning

  • Conference paper
  • First Online:
Frontier Computing (FC 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 542))

Included in the following conference series:

Abstract

Recently, cyber attacks against national institutional information and communication networks have become increasingly intelligent and advanced. Cyber attacks are becoming a serious threat to a nation’s overall social infrastructure. There have been many studies to evaluate the damage done by cyber attacks. Assessing such damage has been proven to affect not only cyber space problems but also existing warfare fields such as physics, cyberelectronic warfare, and firepower. In this paper, we propose the cyber battle damage assessment framework. The cyber battle damage assessment framework will inform command and control of the damage caused by a cyber attack, and calculate the damage to the equipment and impact on the operation. This framework will assist the commander to understand the current situation, helping to make decisions to lead the operation to succeed. To apply the cyber battle damage assessment framework in a wired/wireless integrated environment, we proposed and tested an unauthorized wireless access point detection algorithm based on a machine learning algorithm on a round trip time value dataset. Overall the K nearest neighbors method showed the highest accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gray, K., Ibanez, L., Aylward, S., et al.: An open source software toolkit for image-guided surgery. Computer 39(4), 46–53 (2006)

    Article  Google Scholar 

  2. Duhoe, K., et al.: Intrusion path prediction system using a tree generation and analysis of attack scenarios. Korean Soc. Internet Inf. (KSII) 17(2), 13–14 (2016)

    Google Scholar 

  3. Sheehan, J., et al.: The military missions and means framework. Army Material Systems Analysis Activity Aberdeen Proving Ground MD, No. AMSAA-TR-756 (2004)

    Google Scholar 

  4. Delbert, J., Rafal, R., Masashi, N.: Cyclones in cyberspace: information shaping and denial in the 2008 Russia-Georgia war. Secur. Dialogue 43(1), 3–24 (2012)

    Article  Google Scholar 

  5. Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: 2011 Proceedings of the 14th International Conference on Information Fusion (FUSION). IEEE, Chicago (2011)

    Google Scholar 

  6. Igor, K., Andrey, C.: A cyber attack modeling and impact assessment framework. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1–24. IEEE, Tallinn (2013)

    Google Scholar 

  7. Suman, J., Kasera, K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449–462 (2010)

    Article  Google Scholar 

  8. Hao, H., et al.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)

    Article  Google Scholar 

  9. Alice, E., Gringoli, F., Salgarelli, L.: On the stability of the information carried by traffic flow features at the packet level. ACM SIGCOMM Comp. Commun. Rev. 39(3), 13–18 (2009)

    Article  Google Scholar 

  10. Lanier, W., Beyah, R., Corbett, C.: A passive approach to rogue access point detection. In: IEEE Global Telecommunications Conference, pp. 355–360. IEEE, Washington (2007)

    Google Scholar 

  11. Lizhi, P., et al.: Early stage internet traffic identification using data gravitation based classification. In: 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data. IEEE, Auckland (2016)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Defense Acquisition Program Administration and Agency for Defense Development under the contract UD160066BD.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongkyoo Shin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, D., Kim, D., Shin, D., Shin, D., Kim, YH. (2019). Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2018. Lecture Notes in Electrical Engineering, vol 542. Springer, Singapore. https://doi.org/10.1007/978-981-13-3648-5_59

Download citation

Publish with us

Policies and ethics