probability of false alarm
Recently Published Documents


TOTAL DOCUMENTS

99
(FIVE YEARS 37)

H-INDEX

9
(FIVE YEARS 2)

2022 ◽  
Vol 11 (3) ◽  
pp. 1-11
Author(s):  
Sudhakar Sengan ◽  
Osamah Ibrahim Khalaf ◽  
Vidya Sagar P. ◽  
Dilip Kumar Sharma ◽  
Arokia Jesu Prabhu L. ◽  
...  

Existing methods use static path identifiers, making it easy for attackers to conduct DDoS flooding attacks. Create a system using Dynamic Secure aware Routing by Machine Learning (DAR-ML) to solve healthcare data. A DoS detection system by ML algorithm is proposed in this paper. First, to access the user to see the authorized process. Next, after the user registration, users can compare path information through correlation factors between nodes. Then, choose the device that will automatically activate and decrypt the data key. The DAR-ML is traced back to all healthcare data in the end module. In the next module, the users and admin can describe the results. These are the outcomes of using the network to make it easy. Through a time interval of 21.19% of data traffic, the findings demonstrate an attack detection accuracy of over 98.19%, with high precision and a probability of false alarm.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 662
Author(s):  
Tala Talaei Khoei ◽  
Shereen Ismail ◽  
Naima Kaabouch

Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning System spoofing. Several techniques have been proposed for detecting such attacks. However, the recurrence and frequent Global Positioning System spoofing incidents show a need for effective security solutions to protect unmanned aerial vehicles. In this paper, we propose two dynamic selection techniques, Metric Optimized Dynamic selector and Weighted Metric Optimized Dynamic selector, which identify the most effective classifier for the detection of such attacks. We develop a one-stage ensemble feature selection method to identify and discard the correlated and low importance features from the dataset. We implement the proposed techniques using ten machine-learning models and compare their performance in terms of four evaluation metrics: accuracy, probability of detection, probability of false alarm, probability of misdetection, and processing time. The proposed techniques dynamically choose the classifier with the best results for detecting attacks. The results indicate that the proposed dynamic techniques outperform the existing ensemble models with an accuracy of 99.6%, a probability of detection of 98.9%, a probability of false alarm of 1.56%, a probability of misdetection of 1.09%, and a processing time of 1.24 s.


2021 ◽  
Vol 25 (Special) ◽  
pp. 1-56-1-62
Author(s):  
Sarah S. Mohammed ◽  
◽  
Maher K. Mahmood ◽  

This study presents the performance of the auto-correlation methods for detecting weak signals, where the signal level is much less than the noise level. Double and triple auto-correlation techniques are used to improve the detection performance compared with the single autocorrelation. Simulation results obtained by MATLAB programs show that the multiple correlation techniques outperform the single correlation in terms of probability of detection and probability of false alarm versus signal to noise ratio SNR.


Author(s):  
Oleksandr Oleksenko ◽  
◽  
Hennadii Khudov ◽  
Kyrylo Petrenko ◽  
Yurii Horobets ◽  
...  

The methodological approaches to the use of genetic algorithm for the synthesis of the rational structure of the radar surveillance system are proposed in the paper. The structure of the radar surveillance system is presented in the form of an incidence matrix, which is used as a chromosome by the operators of the genetic algorithm. This matrix is used as a chromosome by the operators of the genetic algorithm. The elements of the incidence matrix that describe the relationships between the elements of the structure of the observation system are genes in the genetic algorithm. In each cycle of the genetic algorithm, a pair of chromosomes is paired, during which part of the genes are exchanged, which for the system under study means the appearance and disappearance of the corresponding connections between the elements. The calculation of the values of the efficiency of radar surveillance for each variant of the structure is proposed to be carried out using the ant colony optimization. The gain in the value of the conditional probability of correct detection with a fixed probability of false alarm is approximately 10% Keywords— genetic algorithm, artificial intelligence, optimization, route, radar surveillance system.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4992
Author(s):  
Mauro Leonardi ◽  
Gheorghe Sirbu

Automatic Dependent Surveillance-Broadcast is an Air Traffic Control system in which aircraft transmit their own information (identity, position, velocity, etc.) to ground sensors for surveillance purposes. This system has many advantages compared to the classical surveillance radars: easy and low-cost implementation, high accuracy of data, and low renewal time, but also limitations: dependency on the Global Navigation Satellite System, a simple unencrypted and unauthenticated protocol. For these reasons, the system is exposed to attacks like jamming/spoofing of the on-board GNSS receiver or false ADS-B messages’ injection. After a mathematical model derivation of different types of attacks, we propose the use of a crowd sensor network capable of estimating the Time Difference Of Arrival of the ADS-B messages together with a two-step Kalman filter to detect these attacks (on-board GNSS/ADS-B tampering, false ADS-B message injection, GNSS Spoofing/Jamming). Tests with real data and simulations showed that the algorithm can detect all these attacks with a very high probability of detection and low probability of false alarm.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3255
Author(s):  
Waqas Bin Abbas ◽  
Fuhu Che ◽  
Qasim Zeeshan Ahmed ◽  
Fahd Ahmed Khan ◽  
Temitope Alade

In this paper, an analytical framework is presented for device detection in an impulse radio (IR) ultra-wide bandwidth (UWB) system and its performance analysis is carried out. The Neyman–Pearson (NP) criteria is employed for this device-free detection. Different from the frequency-based approaches, the proposed detection method utilizes time domain concepts. The characteristic function (CF) is utilized to measure the moments of the presence and absence of the device. Furthermore, this method is easily extendable to existing device-free and device-based techniques. This method can also be applied to different pulse-based UWB systems which use different modulation schemes compared to IR-UWB. In addition, the proposed method does not require training to measure or calibrate the system operating parameters. From the simulation results, it is observed that an optimal threshold can be chosen to improve the ROC for UWB system. It is shown that the probability of false alarm, PFA, has an inverse relationship with the detection threshold and frame length. Particularly, to maintain PFA<10−5 for a frame length of 300 ns, it is required that the threshold should be greater than 2.2. It is also shown that for a fix PFA, the probability of detection PD increases with an increase in interference-to-noise ratio (INR). Furthermore, PD approaches 1 for INR >−2 dB even for a very low PFA i.e., PFA=1×10−7. It is also shown that a 2 times increase in the interference energy results in a 3 dB improvement in INR for a fixed PFA=0.1 and PD=0.5. Finally, the derived performance expressions are corroborated through simulation.


2021 ◽  
Vol 2 (1) ◽  
pp. 97-112
Author(s):  
Hong Mao ◽  
Jin Wang

In this paper, the statistical-economic design of a multivariate special triangle control chart is proposed to control the processes of the quality characteristics or financial indices shifting with time. A multi-objective programming with several constraints is used to determine optimal solutions of control region (probability of false alarm), the power of finding out assignable cause(s), sample interval and sample size. An application of the statistical-economic design of a Multivariate special triangle control chart is illustrated to control the soundness of insurers of U.S


Sign in / Sign up

Export Citation Format

Share Document