Detecting Jamming Attacks Using Machine Learning Models

Abstract

A wireless network is the target of jamming attacks, which cause an undesired denial of service. Despite its robustness due to the utilisation of millimetre wave bands, 5G is susceptible to these attacks. Random jamming has the ability to disrupt wireless networks and stop conversations. Traditional jamming detection systems and solutions try to use fixed-threshold signal evaluation techniques or software-defined radios. Because of their relatively rigid behaviour, high false alarm frequency, and resource-intensive detections, traditional tactics frequently lose their effectiveness when faced with clever or adaptable threats. Fixed-threshold approaches are free from the need to integrate expensive radio frequency hardware and vast amounts of processing, whilst SDR-based implementations can only be fixed threshold mechanisms. RSSI, SNR, BER, and packet loss rate are considered as the detection model metrics in machine learning-based jamming detection systems. By responding to the jamming enquiries quickly, flexibly, and in a hardware- independent manner.

Country : India

1 Paradesi Subba Rao2 Nooka Varsha Reddy3 Shaik Suhani4 Kasetty Susmitha5 Lalam Jhansi6 Pinjari Aneefa

  1. Assistant Professor, Department of Computer Science and Engineering, Santhiram Engineering College, India
  2. Student, Department of Computer Science and Engineering, Santhiram Engineering College, India
  3. Student, Department of Computer Science and Engineering, Santhiram Engineering College, India
  4. Student, Department of Computer Science and Engineering, Santhiram Engineering College, India
  5. Student, Department of Computer Science and Engineering, Santhiram Engineering College, India
  6. Student, Department of Computer Science and Engineering, Santhiram Engineering College, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 176-179

doi.org/10.47001/IRJIET/2025.INSPIRE29

References

  1. Paradesi Subba Rao; Farooq Sunar Mahammad; Parumanchala Bhaskar; M. Shabarish; S. V. Kishore; T. Varun Kumar; B. Chandra Sekhar; S. M. Mansoor. "Detecting malicious Twitter bots using machine learning." https://doi.org/10.1063/5.0212693.
  2. "Morphed Image Detection using Structural Similarity Index Measure", Kiran Kumar G1, Manjula Prabakaran2, Paradesi SubbaRao3, Harini K4, Madhan Mohan R5, Sai Nithin M6 Volume 48 Issue 4 (December 2024) https://powertechjournal.com.
  3. Mahammad, Farooq Sunar, et al. "Key distribution scheme for preventing key reinstallation attack in wireless networks." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  4. Suman, Jami Venkata, et al. "Leveraging natural language processing in conversational AI agents to improve healthcare security." Conversational Artificial Intelligence (2024): 699-711.
  5. Sunar, Mahammad Farooq, and V. Madhu Viswanatham. "A fast approach to encrypt and decrypt of video streams for secure channel transmission." World Review of Science, Technology and Sustainable Development 14.1 (2018): 11-28.
  6. Mahammad, Farooq Sunar, Karthik Balasubramanian, and T. Sudhakar Babu. "A comprehensive research on video imaging techniques." All Open Access, Bronze (2019).
  7. Mahammad, Farooq Sunar, and V. Madhu Viswanatham. "Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach." The Journal of Supercomputing 76.4 (2020): 2275-2288.
  8. Devi, M. Sharmila, et al. "Extracting and Analyzing Features in Natural Language Processing for Deep Learning with English Language." Journal of Research Publication and Reviews 4.4 (2023): 497-502.
  9. Devi, M. Sharmila, et al. "Machine Learning Based Classification and Clustering Analysis of Efficiency of Exercise Against Covid-19 Infection." Journal of Algebraic Statistics 13.3 (2022): 112-117.
  10. Mandalapu, Sharmila Devi, et al. "Rainfall prediction using machine learning." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  11. Chaitanya, V. Lakshmi, et al. "Identification of traffic sign boards and voice assistance system for driving." AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  12. Chaitanya, V. Lakshmi. "Machine Learning Based Predictive Model for Data Fusion Based Intruder Alert System." journal of algebraic statistics 13.2 (2022): 2477-2483.
  13. Chaitanya, V. Lakshmi, and G. Vijaya Bhaskar. "Apriori vs Genetic algorithms for Identifying Frequent Item Sets." International journal of Innovative Research &Development 3.6 (2014): 249-254.
  14. Parumanchala Bhaskar, et al. "Incorporating Deep Learning Techniques to Estimate the Damage of Cars During the Accidents" AIP Conference Proceedings. Vol. 3028. No. 1. AIP Publishing, 2024.
  15. Parumanchala Bhaskar, et al “Cloud Computing Network in Remote Sensing-Based Climate Detection Using Machine Learning Algorithms” remote sensing in earth systems sciences (springer).
  16. Parumanchala Bhaskar, et al. "Machine Learning Based Predictive Model for Closed Loop Air Filtering System." Journal of Algebraic Statistics 13.3 (2022): 416-423.