Network Intrusion Detection to Mitigate Jamming and Spoofing Attacks Using Federated Leading: A Comprehensive Survey

Network Intrusion Detection to Mitigate Jamming and Spoofing Attacks Using Federated Leading: A Comprehensive Survey

Copyright: © 2024 |Pages: 24
DOI: 10.4018/978-1-6684-7625-3.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Network intrusions through jamming and spoofing attacks have become increasingly prevalent. The ability to detect such threats at early stages is necessary for preventing a successful attack from occurring. This survey chapter thoroughly overviews the demand for sophisticated intrusion detection systems (IDS) and how cutting-edge techniques, like federated learning-enabled IDS, can reduce privacy risks and protect confidential data during intrusion detection. It explores numerous mitigation strategies used to defend against these assaults, highlighting the significance of early detection and avoidance. The chapter comprehensively analyzes spoofing and jamming attacks, explores mitigation techniques, highlights challenges in implementing federated learning-based IDS, and compares diverse strategies for their real-world effects on network security. Lastly, it presents an unbiased evaluation of contemporary IDS techniques, assessing their advantages, disadvantages, and overall effect on network security while also discussing future challenges and prospects for academia and industry.
Chapter Preview
Top

Introduction

The growing prevalence of jamming and spoofing attacks in wireless networks is a cause for concern. The need to develop effective countermeasures has become even more urgent in recent years. Network Intrusion Detection (NID) can be a critical component for protecting against these attacks by detecting malicious activity or events within the network environment (Chaabouni, 2019). However, NID systems have limited effectiveness when faced with complex attack scenarios such as those arising from asymmetric links between multiple Access Points (APs) (Basati, 2023). To address this limitation, novel techniques based on Federated Learning (FL) which utilize data collected from APs across different locations, should be explored. This paper presents an overview of state-of-the-art methods related to NID using federated learning approaches and discusses future directions that researchers should explore in order to create highly secure and resilient network environments against jamming and spoofing attacks (Han, 2022).

Therefore, mitigation goals focus on seeking structured solutions, including security methods such as cryptography-based protection techniques. It may rely on encryption processes explicitly designed to deter Cryptographic Suite Assessment (CSA) against these common types of cyberattacks mentioned above. Detecting suspicious messages before they take proper form within protocols so establishing control mechanisms is vital for anti-jam/spoof detection engines. In addition, isolating any physical attackers by designing efficient countermeasures to avoid existing environmental noise contributed during vulnerable period’s demands solutions. Moreover, applying appropriate access controls allows only trusted entities to interact with targeted services or resources and blocks user's authentication by attempting open connections from alleged compromised location(s) (Khan K. M., 2020), (Alloghani, 2019).

Therefore, reducing threats from jamming and spoofing is essential due to their capacity to stop reliable service delivery, as well as financial losses related to assets being exposed often overlooked. It may lead to potentially catastrophic results if no preventive action is taken (Vaishnavi, 2021). Implementation in advance leverages appropriate defences and helps in addressing vulnerabilities that reoccur in the future. It may ultimately harm organizations and raise consequences. Safeguarding also gives the most significant level of assurance for the needed infrastructures' Successful configuration and other benefits, including satisfaction to all parties engaged in the transactions, specified trajectory target operates safely, expects to fulfil compliance rules (YAMAN, 2023). Customer esteem and loyalty, additional growth for the organization, and a positive side scale (Yu, 2022). Multiple difficulties in the execution need good collaboration to protect the investment (Liu, 2022). This survey paper aims to provide a comprehensive review of the research on using federated learning to develop network intrusion detection systems that can mitigate jamming and spoofing attacks (Yin, 2020).The scope of the paper will include an overview of the current state-of-the-art intrusion detection systems, the challenges associated with jamming and spoofing attacks, and the application of federated learning in intrusion detection systems (Kulkarni, 2020), (Belenguer, A review of federated learning in intrusion detection systems for iot. arXiv preprint arXiv:2204.12443., 2022).

Complete Chapter List

Search this Book:
Reset