Research Article

Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods

Volume: 7 Number: 2 August 31, 2024
EN

Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods

Abstract

As technology advances, the frequency of attacks targeting technological devices has surged. This rise in cyber threats poses a constant risk to the devices we rely on. Any device connected to a network becomes vulnerable to exploitation by attackers. Given the extensive interconnectedness of devices in network environments, this research endeavors to address this pressing issue. The aim of this study is to analyze and classify network traffic generated during potential cyber attacks using various classification algorithms. By subjecting a simulated environment to different cyber attack scenarios, we extract the distinctive features of network packets generated during these attacks. Subsequently, we employ widely used classification algorithms to train and analyze the obtained data. For the comparison of models, more than 7000 attack data instances were employed. At the conclusion of the comparison, the Gradient Boosting algorithm achieved the highest accuracy value, reaching 91%, whereas the Naive Bayes algorithm obtained the lowest accuracy, reaching 74%.

Keywords

Supporting Institution

Fırat University

Project Number

Our study is supported by Fırat University Scientific Research Projects Coordination Unit with project number TEKF.23.12.

Thanks

We would like to thank Fırat University.

References

  1. A. N. Ozalp, Z. Albayrak, and A. Zengin, “Expansion of Wireless Networks using IEEE 802.3af Protocol in Protected Areas,” in 5th International Symposium on Innovative Technologies in Engineering and Science, 2017.
  2. M. Wazid, A. K. Das, V. Chamola, and Y. Park, “Uniting cyber security and machine learning: Advantages, challenges and future research,” 2022. doi: 10.1016/j.icte.2022.04.007.
  3. S. GÖNEN, H. İ. ULUS, and E. N. YILMAZ, “Bilişim Alanında İşlenen Suçlar Ve Kişisel Verilerin Korunması,” Bilişim Teknol. Derg., vol. 9, no. 3, Sep. 2016, doi: 10.17671/btd.90710.
  4. E. AKBAL, Ş. DOĞAN, T. TUNCER, and N. S. ATALAY, “Adli Bilişim Alanında Ağ Analizi,” Bitlis Eren Üniversitesi Fen Bilim. Derg., vol. 8, no. 2, pp. 582–594, 2019, doi: 10.17798/bitlisfen.479303.
  5. K. A. Dhanya, S. Vajipayajula, K. Srinivasan, A. Tibrewal, T. S. Kumar, and T. G. Kumar, “Detection of Network Attacks using Machine Learning and Deep Learning Models,” Procedia Comput. Sci., vol. 218, pp. 57–66, 2023, doi: 10.1016/j.procs.2022.12.401.
  6. R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues,” 2022. doi: 10.3390/s22134730.
  7. A. Mughaid et al., “Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches,” Multimed. Tools Appl., vol. 82, no. 9, pp. 13973–13995, Apr. 2023, doi: 10.1007/s11042-022-13914-9.
  8. M. Waqas, S. Tu, Z. Halim, S. U. Rehman, G. Abbas, and Z. H. Abbas, “The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges,” Artif. Intell. Rev., vol. 55, no. 7, pp. 5215–5261, Oct. 2022, doi: 10.1007/s10462-022-10143-2.

Details

Primary Language

English

Subjects

Software Engineering (Other)

Journal Section

Research Article

Early Pub Date

August 23, 2024

Publication Date

August 31, 2024

Submission Date

April 1, 2024

Acceptance Date

June 4, 2024

Published in Issue

Year 2024 Volume: 7 Number: 2

APA
Kaçan, İ., Gül, B., & Ertam, F. (2024). Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods. Sakarya University Journal of Computer and Information Sciences, 7(2), 203-216. https://doi.org/10.35377/saucis...1462721
AMA
1.Kaçan İ, Gül B, Ertam F. Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods. SAUCIS. 2024;7(2):203-216. doi:10.35377/saucis.1462721
Chicago
Kaçan, İmran, Batuhan Gül, and Fatih Ertam. 2024. “Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods”. Sakarya University Journal of Computer and Information Sciences 7 (2): 203-16. https://doi.org/10.35377/saucis. 1462721.
EndNote
Kaçan İ, Gül B, Ertam F (August 1, 2024) Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods. Sakarya University Journal of Computer and Information Sciences 7 2 203–216.
IEEE
[1]İ. Kaçan, B. Gül, and F. Ertam, “Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods”, SAUCIS, vol. 7, no. 2, pp. 203–216, Aug. 2024, doi: 10.35377/saucis...1462721.
ISNAD
Kaçan, İmran - Gül, Batuhan - Ertam, Fatih. “Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods”. Sakarya University Journal of Computer and Information Sciences 7/2 (August 1, 2024): 203-216. https://doi.org/10.35377/saucis. 1462721.
JAMA
1.Kaçan İ, Gül B, Ertam F. Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods. SAUCIS. 2024;7:203–216.
MLA
Kaçan, İmran, et al. “Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods”. Sakarya University Journal of Computer and Information Sciences, vol. 7, no. 2, Aug. 2024, pp. 203-16, doi:10.35377/saucis. 1462721.
Vancouver
1.İmran Kaçan, Batuhan Gül, Fatih Ertam. Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods. SAUCIS. 2024 Aug. 1;7(2):203-16. doi:10.35377/saucis. 1462721

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License