Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.32604/iasc.2022.020598
|View full text |Cite
|
Sign up to set email alerts
|

Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

Abstract: The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber's belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Extract a higher level and generalisable function representation from the abstract syntax tree (AST), use this function representation as the training set to train a vulnerability classification model on the bidirectional LSTM neural network, and apply it to the vulnerability detection task in cross project scenarios (Islam et al, 2019;Zhang et al, 2018). A novel numerical vector is calculated using the control flow chart of each binary function, and then the similarity can be effectively detected by measuring the distance between the embedding of two functions (Adi et al, 2020;Afzal and Murugesan, 2022). Use the neural network to learn the patterns in the input file from the past fuzzy exploration, and perform fuzzy mutation according to the past mutation and the corresponding code coverage information to guide future fuzzy exploration (Ashraf et al, 2020;da Costa et al, 2019).…”
Section: Vulnerability Detection Using Deep Learningmentioning
confidence: 99%
“…Extract a higher level and generalisable function representation from the abstract syntax tree (AST), use this function representation as the training set to train a vulnerability classification model on the bidirectional LSTM neural network, and apply it to the vulnerability detection task in cross project scenarios (Islam et al, 2019;Zhang et al, 2018). A novel numerical vector is calculated using the control flow chart of each binary function, and then the similarity can be effectively detected by measuring the distance between the embedding of two functions (Adi et al, 2020;Afzal and Murugesan, 2022). Use the neural network to learn the patterns in the input file from the past fuzzy exploration, and perform fuzzy mutation according to the past mutation and the corresponding code coverage information to guide future fuzzy exploration (Ashraf et al, 2020;da Costa et al, 2019).…”
Section: Vulnerability Detection Using Deep Learningmentioning
confidence: 99%