Abstract

Mimicry attack is a fraud attack in which an attack can forge a legitimate user by imitating a legitimate user's media access control address or other identity credentials. In this paper, we propose an unsupervised model, namely DAMA, to detect mimicry attack by using the time-series of received signal strength (RSS) to detect the change of the device's location. The RSS of a device is related to its location, so it is difficult to forge. According to our experimental results, the F1 of DAMA is two times higher than state-of-the-art and the false alarm rate of DAMA is only 18% of state-of-the-art.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.