From: A survey on cognitive radio network attack mitigation using machine learning and blockchain
References | Type of attack | ML algorithm used |
---|---|---|
[20] | SSDF | SVM |
[21] | PUEA | SVM |
[22] | Backoff manipulation attack (BMA) | SVM |
[23] | PUEA | SVM |
[24] | SSDF | SVM |
[25] | Malicious activity | SVM |
[26] | PUEA | KNN |
[27] | SSDF | Ensemble |
[28] | SSDF | Ensemble |
[29] | PUEA and SSDF | Ensemble |
[30] | Jamming attack | Ensemble |
[31] | PUEA | Decision tree |
[32] | SSDF | Decision tree and Bayes network |
[33] | Malicious users | LR, SVM, KNN |
[34] | PUEA | Logistic regression with maximum likelihood estimation and gradient ascent |
[35] | SSDF | Neural network |
[36] | SSDF | K-medoids and mean shift clustering |
[37] | SSDF and jamming attack | Improved K-means |
[38] | PUEA | K-means ++ clustering |
[39] | SSDF | Binary clustering |
[40] | SSDF | Fuzzy logic |
[41] | PUEA, SSDF, software-defined network attack, sinkhole attack | Neyman–Pearson criterion and adaptive neuro-fuzzy inference system |
[42] | PUEA | Fuzzy conditional entropy maximization |
[43] | PUEA, replay attack and DOS attack | Weighted fuzzy C means clustering cum kernel cumulative sum model |
[44] | SSDF | fuzzy c-means-based semi-supervised algorithm |
[45] | PUEA | Bayesian decision approach |
[46] | SSDF | Bayesian interference-based sliding window and weighted trust calculation scheme |
[47] | Jamming attack | Dynamic Bayesian network |
[48] | Jamming attack | Two single dynamic Bayesian network (DBN) and bank-parallel dynamic Bayesian network (DBN) |
[45] | PUEA | Bayesian decision theory |
[49] | Learning-Evaluation-Beating attacks | adversarial machine learning |
[50] | SSDF | Eclat algorithm |
[51] | Jamming attack | ProML algorithm, a random forest algorithm-based strategy |
[52] | PUEA and SSDF | Nearest centroid classifier |
[53] | Malicious users | Reinforcement learning |
[54] | PUEA | Reinforcement learning |
[55] | Malicious users | Reinforcement learning |
[56] | Jamming attack and other attacks | Reinforcement learning |
[57] | Off-sensing attack | Reinforcement learning |
[58] | PUEA | Extreme machine learning |
[59] | Malicious user | particle swarm optimization and relevant vector machine (RVM) classifiers |
[60] | SSDF | Improved apriori machine learning algorithm |
[61] | PUEA | Linear regression algorithm |
[62] | PUEA | Minimum covariance determinant |