Skip to main content

Detection of Anomalies in the Call Flow of an Emergency Management Center

  • Conference paper
  • First Online:
Book cover Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (UCAmI 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 594))

  • 837 Accesses

Abstract

The continuous expansion of cyberattacks and their high degree of professionalization generates a context of extreme risk in all sectors of society, both public and private. In this scenario, emergency management centers become a target that could lead to a high impact for citizens and for emergency coordination. This work focuses on the application of Machine Learning techniques for the early detection of possible Telephone Denial of Service or TDoS attacks, regardless of whether they use traditional telephone exchanges or VoIP. To do this, an extensive dataset with real data is here used for the training of the proposed models. In addition, the implementation in Jetson Nano type devices is proposed for the integration in the real context of emergency centers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NBC News: Hackers have taken down dozens of 911 centers (2018). https://www.nbcnews.com/news/us-news/hackers-have-taken-down-dozens-911-centers-why-it-so-n862206. Accessed 31 July 2022

  2. Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity IEEE. Access 6, 35365–35381 (2018). https://doi.org/10.1109/ACCESS.2018.2836950

    Article  Google Scholar 

  3. Shaukat, K., et al.: Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies (Basel) 13(10), 2509 (2020). https://doi.org/10.3390/en13102509

    Article  Google Scholar 

  4. Sharma, R.K., Kalita, H.K., Borah, P.: Analysis of machine learning techniques based intrusion detection systems. In: International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol. 44, pp. 485-493 (2015). https://doi.org/10.1007/978-81-322-2529-4_51

  5. Alshaibi, A., Al-Ani, M., Al-Azzawi, A., Konev, A., Shelupanov, A.: The comparison of cybersecurity datasets. Data 7(2), 22 (2022). https://doi.org/10.3390/data7020022

    Article  Google Scholar 

  6. Yavanoglu, O., Aydos, M.: A review on cyber security datasets for machine learning algorithms. In: IEEE International Conference on Big Data, pp. 2186-2193 (2017). https://doi.org/10.1109/BigData.2017.8258167

  7. Nazih, W., Hifny, Y., S. Elkilani, W., Mostafa, T.: Fast detection of distributed denial of service attacks in VoIP networks using convolutional. Neural Netw. 20, 125–138 (2020). https://doi.org/10.21608/ijicis.2021.51555.1046

  8. Aschenbruck, N., Frank, M., Martini, P.: Present and future challenges concerning DoS-attacks against PSAPs in VoIP networks. In: IEEE International Workshop on Information Assurance, p. 6. (2006). https://doi.org/10.1109/IWIA.2006.19

Download references

Acknowledgements

This research has been possible thanks to the Canary Islands Emergency Coordinating Center 112, the Binter Chair in Cybersecurity and the Edosoft Chair in Cloud Computing and Artificial Intelligence.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Rosa-Remedios .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rosa-Remedios, C., Caballero-Gil, P. (2023). Detection of Anomalies in the Call Flow of an Emergency Management Center. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_97

Download citation

Publish with us

Policies and ethics