Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning

Software-defined radios (SDRs) with substantial cognitive (computing) and networking capabilities provide an opportunity for observing radio communications in an area and potentially identifying malicious rogue agents. Assuming a prevalence of encryption methods, a cognitive network of such SDRs can be used as a low-cost and flexible scanner/sensor array for distributed detection of anomalous communications by focusing on their statistical characteristics. Identifying rogue agents based on their wireless communications patterns is not a trivial task, especially when they deliberately try to mask their activities. We address this problem using a novel framework that utilizes adversarial learning, non-linear data transformations to minimize the rogue agent’s attempts at masking their activities, and game theory to predict the behavior of rogue agents and take the necessary countermeasures.

[1]  Benjamin Recht,et al.  Random Features for Large-Scale Kernel Machines , 2007, NIPS.

[2]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[3]  Christopher Leckie,et al.  R1SVM: A Randomised Nonlinear Approach to Large-Scale Anomaly Detection , 2015, AAAI.

[4]  Marimuthu Palaniswami,et al.  Pattern based anomalous user detection in cognitive radio networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[5]  Blaine Nelson,et al.  The security of machine learning , 2010, Machine Learning.

[6]  Blaine Nelson,et al.  Adversarial machine learning , 2019, AISec '11.

[7]  Bhavani M. Thuraisingham,et al.  Adversarial support vector machine learning , 2012, KDD.

[8]  Alexander J. Smola,et al.  Fastfood: Approximate Kernel Expansions in Loglinear Time , 2014, ArXiv.

[9]  Christopher Leckie,et al.  Large-scale strategic games and adversarial machine learning , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[10]  Seyed-Mohsen Moosavi-Dezfooli,et al.  Robustness of classifiers: from adversarial to random noise , 2016, NIPS.

[11]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[12]  Marius Kloft,et al.  Security analysis of online centroid anomaly detection , 2010, J. Mach. Learn. Res..

[13]  James C. Bezdek,et al.  Some new indexes of cluster validity , 1998, IEEE Trans. Syst. Man Cybern. Part B.

[14]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[15]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[16]  Blaine Nelson,et al.  Poisoning Attacks against Support Vector Machines , 2012, ICML.