<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Detection of Attacks in Wireless Networks of IoT</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olexander Belej</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Bokla</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lіubov Нalkiv</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>153</fpage>
      <lpage>163</lpage>
      <abstract>
        <p>The article considers the problems of ensuring the fault tolerance and reliability of the system, which are the main characteristics of the wireless Internet of Things. Wireless data networks continue to grow rapidly. However, security in these networks often does not meet the required level. Intrusion detection systems are used to protect against wireless network attacks. Thanks to modern computing capabilities, the task of analyzing the parameters of network traffic for signs of an attack can be solved using data mining. The analysis of network attacks relevant to local wireless networks is carried out. The results of the experiments allow us to conclude about the practical significance of the proposed approach to detecting attacks in local wireless Internet of Things.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Internet of things</kwd>
        <kwd>network traffic</kwd>
        <kwd>wireless</kwd>
        <kwd>attack</kwd>
        <kwd>detection systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Wireless networks have gained immense popularity. Their wide distribution is due to the
undeniable advantages over traditional cable networks: ease of deployment, mobility of users in the
network coverage area, easy connection of new users. On the other hand, the security of such
networks often limits their use. If an attacker needs to have a physical connection to the network
during an attack on a wired network, in the case of wireless networks, he can be anywhere in the
network coverage area. Also, these networks are subject to attacks that are related to the imperfection
of the data transmission protocol in wireless IoT networks. Due to the low level of security, such
networks are of limited use in IoT.</p>
      <p>
        Due to the instability and poor protection of wireless networks, various researchers are looking for
ways to improve current protocols. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the author proposes to encrypt the entire MAC data block
(MPDU), including MAC headers, except for the sequence of checking the FCS frame, which will
lead to significant delays in data transmission and low bandwidth of the channel. Another approach is
to enter a hash in the control frame of a certain string known only to a particular sender, by
transmitting which in the future it can be uniquely identified and processed [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. However, this method
prevents only one type of attack.
      </p>
      <p>
        In practice, to protect against network attacks, ordinary users and small organizations are usually
limited to the use of anti-virus software or special additional security modules [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Large businesses
are forced to buy expensive wireless intrusion detection systems (WIDS). However, there are
currently no generally accepted standards in this area. Often the problem of assigning a fragment of
network traffic to some type of attack or normal network activity can be solved by using methods of
data mining (DM) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] to solve this problem, the use of neural networks and the method of reference vectors
Support Vector Machine (SVM) is proposed. In [7] the approach to the organization of the attack
detection system of the neural network based on the two-layer perceptron and the Kohonen network
was considered. It should be noted that the above studies concerned the detection of intrusions into
traditional wired networks [8].
      </p>
      <p>Despite the significant amount of work on the targeted use of data mining methods to detect
attacks specific to local wireless networks, this area of research requires further study and
experimentation with different algorithms for detecting attacks in wireless IoT networks. For this
reason, this study examines the main types of attacks inherent in wireless networks, some
recommended methods of protection against them, and proposes the architecture of an attack
detection system based on data mining methods. At the end of the study, the evaluation of the
effectiveness of the used algorithms for detecting attacks in wireless IoT networks.
2. Attacks Implemented in the Wireless Networks of IoT</p>
      <p>Wireless network attacks are based on the interception of network traffic from an access point or
traffic between two connected stations, as well as the introduction of additional data into a wireless
session. To better understand the types of wireless attacks that an attacker can carry out against a
wireless network, it is important to classify them. Thus, attacks can be directed at different levels of
the OSI model: application, transport, network, channel, and physical.</p>
      <p>Depending on the purpose of the attack, specific to the family of 802.11 protocols, can be divided
into several categories [9]: obtaining unauthorized access to the network; violation of integrity; breach
of confidentiality; violation of access; theft of personal data.</p>
      <p>Depending on the purpose of the attack on local wireless networks, OSI models can be divided
into several categories [10]:</p>
      <p> Obtaining unauthorized access to the network: false access point; MAC spoofing; hacking the
network client; hacking of access points.</p>
      <p> Integrity violation: 802.11 frame input; play 802.11 data, delete 802.11 data; play 802.1X
EAP; play 802.1X RADIUS.</p>
      <p> Breach of confidentiality: eavesdropping; evil twin; AP phishing; the man in the middle.
 Accessibility violations: radio frequency noise; Queensland DoS; Probe with a request for
attacks;</p>
      <p> Associate/authenticate/disconnect/de-authenticate an attack; 802.1X EAP Start, EAP Failure
Flood.</p>
      <p> Authentication bypass: pre-shared key; Theft of personal data 802.1X; 802.1X EAP
Decrease; 802.1X password hacking; hacking of domain accounts; hacking WPS pin.</p>
      <p>These attacks are based on the use of vulnerable wireless networks presented in the WVE database
[11]:
 Sending probe requests with a zero-length SSID tag field (WVE-2006-0064).
 EAP denial attacks (WVE-2005-0050).
 RTS / CTS attacks (WVE-2005-0051).
 The capture of WLAN packets of dissociation (WVE-2005-0046).
 The capture of a wireless local area network by network packets (WVE-2005-0045).
 Sending an invalid authentication reason code.
 Sending too long SSID (WVE-2006-0071, WVE-2007-0001).
 Sending the Airjack beacon frame (WVE-2005-0018).
 Sending invalid channel numbers in beacon frames (WVE-2006-0050).</p>
      <p>Wireless access testing for WPA2-Enterprise. In this case, the connection means a sequence of
packets that begin and end at certain points in time, between which data streams are transmitted from
the source IP address to the IP address of the recipient using a specific protocol [12]. Each connection
is referred to as normal or as some type of attack from four categories of attacks: denial of service
(DoS), unauthorized acquisition of user rights Remote to Local (R2L), an unauthorized increase of
user rights to superuser User to Root (U2R) and sounding. The ratio of the number of attacks of
different types is shown in Tables 1 and 2.</p>
      <p>R2L</p>
      <p>Probe
Class
guess_passwd
ftp_write
imap
phf
multihop
warezmaster
Class
portsweep
upsweep
satan
nmap</p>
      <p>R2L
Class
guess_passwd
ftp_write
imap
phf
multihop
warezmaster</p>
      <p>Probe
Class
portsweep
upsweep
satan
nmap</p>
      <p>Some of these types of attacks are losses due to the use of radiofrequency data technology, and
also depend on the human factor and must be addressed through organizational measures. Wireless
intrusion detection (WIDS) systems are significantly different from network security systems, except
firewalls.
3. Attacks Implemented in the Wireless Networks of IoT</p>
      <p>The decision on the security of any network activity in commercial security systems is
implemented using closed algorithms, the principle of which is a trade secret. Moreover, the stated
number and types of detected attacks differ for different products, although in reality, they belong to
the same type of attack, which is explained by the lack of standards in the classification.</p>
      <p>The problem of detecting and classifying attacks can be solved using data analysis methods (DM),
which allow identifying significant relationships, patterns, and trends in large amounts of data on
attacks. The developed system uses algorithms for constructing a classification model based on the
reference vector method, the method of k-nearest neighbors, neural networks, and decision trees.</p>
      <p>The proposed architecture of the intelligent attack detection system has a modular scheme for the
organization of interaction between components with a dedicated subsystem of the sensor and
centralized control through the administrator console. The architecture of the attack detection system
is presented in Fig. 1.</p>
      <p>The basis for detecting attacks is the knowledge base, the construction of which at the stage of the
initial configuration of the system involves a block of construction of the classification model. The
classification model is based on the signatures of the training sample and then used to classify the
actual activities of the network.</p>
      <p>The attack detection module of the designed attack detection system can be functionally divided
into a submodule for detecting network attacks at the transport and application level and a submodule
for detecting attacks at the communication level.</p>
      <p>The system works in two models:
 Сonfiguration model, when a set of signatures is loaded into the block to build a classification
model as an input, each of which is a pair {vector of traffic parameters | attack type}.</p>
      <p> Normal operation model, when the values of the motion parameters are given as input data to
the sensor subsystem.</p>
      <p>The main tasks of detecting and classifying attacks can be solved using DM methods to detect
significant correlations, patterns, and trends in large arrays of network attacks. To analyze large arrays
of attacks, we will use DM methods, which form the basis of the algorithm for constructing a
classification model of the proposed system.
4. Methods for Analysis of Attacks in Sensor Wireless Networks of IoT</p>
      <p>The reference vectors (SVM) method was used to analyze attacks and IoT wireless networks. In
this case, each state of the system is represented as a point in multidimensional space, the coordinates
of which are the characteristics of the system. Two sets of points belonging to two different classes
are separated by a hyperplane in this space. In this case, the hyperplane is constructed in such a way
that the distances from it to the nearest instances of both classes are maximum, which provides the
greatest accuracy of classification.</p>
      <p>Fig. 2 shows the classification of network attacks in two-dimensional space using SVM.</p>
      <p>The figure shows a training data set, which is a set of points of the form {  ,   },  = 1, … ,  , where
  ∈   ,   ∈ {1, −1} is an indicator of the class to which the point belongs xi . The classes of points
are linearly separable, that is, there is such a hyperplane, on one side of which there are points of the
class   = 1, and on the other of the class   = −1. Points located directly on the hyperplane satisfy
the equation:</p>
      <p>ω ∙ x − b = 0, (1)
where the vector ω is the perpendicular to the dividing hyperplane, the quantity | |⁄‖ω‖ (the
absolute value of b divided by the modulus of the vector ω) determines the distance from the origin to
the hyperplane, the operator “∙” denotes the scalar product in the Euclidean space in which the data
lies.</p>
      <p>All points for which the condition ω ∙   − b = 1 is lie in the hyperplane H1 parallel to the
separating hyperplane and at a distance |1 −  |⁄‖ω‖ from the origin. Similarly, those points for
which the condition ω ∙   − b = −1 are lie in the hyperplane H2 parallel to the plane H1 and the
separating hyperplane, at a distance |−1 −  |⁄‖ω‖ from the origin. Thus, the distance between the
plane and the positive reference vector is 1⁄‖ω‖, and therefore, the width of the strip is 2⁄‖ω‖.</p>
      <p>The method of detecting attacks based on the reference vector method was used to build a
classification model based on the training sample. The model was tested for attacks such as buffer
overflow, rootkit, and SYN flood, and demonstrated the appropriateness of using the support vector
method as the basis for an attack detection system. The advantages of this method are high accuracy,
generalization, and low computational complexity of decision making. The disadvantage is the
relatively high computational complexity of building a classification model.</p>
      <p>The k-nearest neighbor (k-NN) method is used to assign network attacks to the class that is most
common among neighbors for certain attacks. Neighbors are formed from many objects whose classes
are already known and based on the given value of k (k≥1), it is determined which of the classes is the
most numerous among them. If k=1, then the object simply belongs to the class of the only nearest
neighbor. The k-NN method is one of the simplest DM methods. The disadvantage of the k-NN
method is its sensitivity to the local data structure.</p>
      <p>Neural networks can solve practical problems related to the recognition and classification of
network attacks. The neural network consists of interconnected neurons that form the input,
intermediate, and output layers. Learning occurs by adjusting the weight of neurons to minimize
classification errors. The advantages of neural networks reveal their ability to automatically acquire
knowledge in the learning process, as well as the ability to generalize. The main disadvantage is the
sensitivity to noise in the input data.</p>
      <p>Decision trees are used to record in detail the attributes on which the target function depends, the
values of the target function are written in "leaves", and the attributes that distinguish network attacks
are written to other nodes. To classify a new object, you need to go down the tree from root to leaf
and get the appropriate class, the path from the root to leaf acts as a classification rule based on the
values of the attributes of the attacks. The advantages of decision trees are a simple principle of their
construction, good interpretation of the results; the disadvantage is the low accuracy of classification.</p>
      <p>To determine the most effective method of constructing a classification model using a wireless
attack detection system, a comparison of the considered DM methods will be performed.
5. Analysis of Cyberattacks in Sensor Wireless Systems of IoT</p>
      <p>The accuracy of recognition of the considered types of attacks using SWS was evaluated by
comparing the results of classification using different DM methods.</p>
      <p>Based on the above classification of attacks by OSI model levels, attacks on local wireless
networks can be divided into two groups: physical attacks and communication layer attacks, which
are specific to wireless networks; application-level network attacks inherent in any LAN organization
technology, including Ethernet.</p>
      <p>The corresponding sub-module of detection of attacks of the offered system during experiments
uses signatures of base NSL KDD-2009 as an example of network attacks and level of application
programs. To form a training sample of wireless attacks at the channel and network level, a test local
wireless network with WPA2-PSK access protection technology was organized. The collected
packages were analyzed and reduced to the form used in the NSL-KDD-2009 database.</p>
      <p>Initially, 41 attributes were used to describe the attacks in the NSL-KDD-2009 database, which
reflects the application, transport, and network layers of the OSI model. Selected functions are
presented in Table 3. To describe attacks characterized by a large number of connections to the target
node, a window lasting two seconds (DoS-attacks) was selected, as well as a window of 100
connections to the same node (probe).</p>
      <p>Number of “hot” indicators
Number of failed login attempts
Successful entry
Access with administrative credentials
Number of access attempts with
administrative credentials
Number of attempts to use the command
line
Number of connections with a matching
host
% connection with error “SYN”
% connections with “REJ” error /%
connections with the same source port</p>
      <p>Type
Numerical
Text
Text
Binary
Numerical
Numerical
Binary
Numerical
Numerical
Numerical
Numerical
Binary
Binary
Numerical
Numerical
Numerical
Numerical
Numerical
same_srv_rate /
dst_host_same_srv_ rate
diff_srv_rate / dst_host_diff_srv_
rate
srv_serror_rate /
dst_host_srv_serror _ rate
srv_rerror_rate /
dst_host_srv_rerror _ rate
srv_diff_host_rate /
dst_host_srv_diff_ host_ rate
% of connections with the same service
% connection to various services
% connections with “SYN” error
% connections with error “REJ”'
% connections with different hosts</p>
      <p>The first step was to process the data from the database because for the algorithms to work
smoothly, all attributes must have numeric values distributed between zero and one. To do this, text
attributes were converted to binary, while numeric - normalized to the minimum and maximum
values.</p>
      <p>After that, the data of the training sample were sent to the input of the building block of the
classification model, which forms the basis of the knowledge base, by various methods of CM. The
attack detection module then classified the test set entries based on the appropriate model according to
the criteria contained in the knowledge base and assigned a network activity class label. Based on the
coincidence of evaluation and actual labels of classes, the effectiveness of attack detection was
evaluated according to the following criteria:</p>
      <p>The total percentage of correctly classified attacks A (accuracy):
where TP is the number of true-positive records, TN is the number of true-negative records, N is the
total number of classified records.</p>
      <p>The accuracy of the classification P (precision):
 =
 =
 =
,
,
802.11 Protocol Features
frame_ type/subtype
protocol_type
source_address
destination_address
Length
SSID
sequence_number
fragment_number
DS_status
more_fragments
retry
pwr_mgt
more_data</p>
      <p>Description
Frame Type / Subtype
Link Protocol Type
Source MAC Address
Destination MAC address
Frame size, bytes
SSID tag value
Frame number
Fragment Number
Distributed system sharing
More fragments for transmission, 0 otherwise
Retransmission of the previous frame, 0 otherwise
The client is in power saving mode, 0 otherwise
Buffered frames for transmission, 0 otherwise
Type
Text
Text
Text
Text
Text
Numerical
Numerical
Numerical
Numerical
Binary
Binary
Binary
Binary
protected_flag
order_flag
duration
chan_number
signal
TX_rate
cipher
reason_code
Statistics in 2 seconds
mng_frm_count
ctrl_frm_count
probe_count
frag_count</p>
      <p>Frame data is encrypted, 0 otherwise
Processing frames strictly in order, 0 otherwise
ACK + SIFS Transmission Duration, μs
Channel number
The signal level of the transmitter,%
Baud Rate, Mbps
Used encryption algorithm
Deauthentication Reason Code
The number of management personnel
The number of control frames
Number of connection requests</p>
      <p>The average number of fragmented packets
The experiments were carried out according to the algorithm shown in Fig. 3.
Numerical
Numerical
Numerical
Numerical</p>
      <p>The support vector method was implemented using the SVS C-SVC library LibSVM, and the
radial basis function (RBF) was used as the kernel function. The maximum learning error was limited
to 10-5.</p>
      <p>The classification results using various DM methods are shown in Tables 5 and 6.</p>
      <p>When classified by the method of k-nearest neighbors experimentally, as the optimal parameters of
the algorithm, we chose a value of k equal to five. The neural network was implemented as a
multilayer perceptron with two hidden layers. Training lasting 1500 cycles was performed using the
algorithm of inverse error propagation. The maximum learning error is 10-7.</p>
      <p>Decision trees were constructed using the standard RapidMiner operator, the minimum threshold
for forming a new node was four, the minimum number of node leaves was one, and the maximum
number of levels was 10.
As can be seen from Table 5, the methods of supporting vectors and k-nearest neighbors showed
similar results in the process of detecting attacks, the decision tree and the neural network worked
somewhat worse. The low detection rate of certain types of attacks, such as master-master,
guess_passwd, buffer_overflow, and land, is due to the uneven distribution of training samples for
different classes—the predominance of common signatures and attacks in the DoS and Probe
categories. For the same reason, some attacks were misclassified, so the results are not presented in
Table 5. However, according to Table 6, the k-nearest neighbor method and decision tree are superior
to SVM and neural networks in solving the problem of link-level attacks.</p>
      <p>Thus, the analysis of experimental data shows that the algorithms used to detect network attacks in
IoT have different values of attack detection efficiency, depending on the type of network activity and
the level of the OSI model on which the attack is implemented.</p>
    </sec>
    <sec id="sec-2">
      <title>6. Conclusion</title>
      <p>The article proposes to use a combination of four algorithms and one classifier, which determines
the final class of network activity by weighted voting.</p>
      <p>The study allows to classify network attacks occurring in wireless LANs in the Internet of Things
and to build the architecture of the proposed attack detection system, which is based on the use of DM
methods to recognize network attacks on the database and compare these methods during experiments
to detect network attacks in IoT.</p>
      <p>The selected methods have shown high accuracy and completeness of detection of cyberattacks
during experiments, and the developed system of detection of attacks in wireless IoT networks can
have practical application. The obtained results provide the development of sound recommendations
for eliminating the identified bottlenecks and improving the security of the IoT network. Based on
these recommendations, the user makes changes to the configuration of the real network or its model,
and then, if necessary, repeats the process of vulnerability analysis and security assessment. Thus, the
required level of computer network security is ensured at all stages of the IoT life cycle.</p>
      <p>The architecture and principles of operation of the proposed system for detecting attacks in
wireless IoT networks will be the basis for further research. The scope of further research includes
improving network attack models and assessing the level of IoT protection, in particular: metric
security systems and rules for their calculation, development of system components, modification of
the approach to wireless network security analysis, and further experimental evaluation of proposed
solutions for IoT networks.
7. References
[7] W. Han, Z. Tian, Z. Huang, D. Huang, Y. Jia, Quantitative Assessment of Wireless Connected
Intelligent Robot Swarms Network Security Situation, IEEE Access 7 (2019) 134293–134300.
doi:10.1109/ACCESS.2019.2940822.
[8] S. P. Dongare, R. S. Mangrulkar, Implementing energy-efficient technique for defense against
Gray-Hole and Black-Hole attacks in wireless sensor networks, in: International Conference on
Advances in Computer Engineering and Applications, 2015 рр. 167–173.
doi:10.1109/ICACEA.2015.7164689.
[9] M. A. Alsheikh, S. Lin, D. Niyato, H. Tan, Machine Learning in Wireless Sensor Networks:
Algorithms, Strategies, and Applications, IEEE Communications Surveys &amp; Tutorials 16.4
(2014) 1996–2018. doi:10.1109/COMST.2014.2320099.
[10] Y. El Mourabit, A. Toumanari, A. Bouirden, H. Zougagh, R. Latif, Intrusion detection system in
Wireless Sensor Network based on mobile agent, in: Second World Conference on Complex
Systems (WCCS), Agadir, 2014, рр. 248–251. doi:10.14569/IJACSA.2015.060922.
[11] I. Sreeram, V. P. K. Vuppala, HTTP flood attack detection in application layer using machine
learning metrics and bio-inspired bat algorithm, Applied Computing, and Informatics 15 (2019)
1–5. doi:10.1016/j.aci.2017.10.003.
[12] S. Nandita, S. Jaydeep, S. Jaya, S. Moumita, Designing of an online intrusion detection system
using rough set theory and Q-learning algorithm, Neurocomputing 11.1 (2013) 161–168.
doi:10.1016/j.neucom.2012.12.023.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Olusola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Oladele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Abosede</surname>
          </string-name>
          ,
          <article-title>Analysis of KDD'99 Intrusion Detection Dataset for Selection of Relevance Features</article-title>
          ,
          <source>World Congress on Engineering and Computer Science</source>
          <volume>1</volume>
          (
          <year>2010</year>
          )
          <fpage>162</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Pham</surname>
          </string-name>
          ,
          <article-title>An efficient solution for preventing Dis'ing attack on 802.11 networks</article-title>
          ,
          <source>in: International Conference on Green Technology and Sustainable Development</source>
          ,
          <year>2012</year>
          рр.
          <fpage>395</fpage>
          -
          <lpage>403</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Belej</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nestor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Polotai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sadeckii</surname>
          </string-name>
          ,
          <article-title>Features of application of data transmission protocols in wireless networks of sensors</article-title>
          ,
          <source>in: 3-rd International Conference Advanced information and communication technologies</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>317</fpage>
          -
          <lpage>322</lpage>
          . doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2019</year>
          .
          <volume>8847878</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mulay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Devale</surname>
          </string-name>
          , G. Garje,
          <article-title>Intrusion Detection System using Support Vector Machine and Decision Tree</article-title>
          ,
          <source>International Journal of Computer Applications</source>
          <volume>3</volume>
          .3 (
          <year>2010</year>
          )
          <fpage>40</fpage>
          -
          <lpage>43</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNIT.
          <year>2010</year>
          .
          <volume>5508557</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>Review on the development and future trend of the intrusion detection system (IDS)</article-title>
          ,
          <source>in: International Conference on Communication and Electronics Systems (ICCES)</source>
          ,
          <year>2016</year>
          , рр. 1-
          <fpage>6</fpage>
          . doi:
          <volume>10</volume>
          .1109/CESYS.
          <year>2016</year>
          .
          <volume>7889907</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Smart integration of cloud computing and MCMC based secured WSN to monitor the environment</article-title>
          ,
          <source>in: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory, and Aerospace &amp; Electronic Systems</source>
          ,
          <year>2014</year>
          , рр.1-
          <fpage>5</fpage>
          . doi:
          <volume>10</volume>
          .1109/VITAE.
          <year>2014</year>
          .
          <volume>6934449</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>