Data Mining Approach to Analyzing Intrusion Detection of Wireless Sensor Network

Shamim H Ripon, Shamse Tasnim Cynthia

Abstract


Wireless Sensor Network (WSN) is a collection of distributed wireless sensor nodes and a base station where the dispersed nodes are used to monitor and record the physical conditions of the environment and then these data are organized into the base. Its application has been reached out from critical military application such as battlefield surveillance to traffic, health, industrial areas, intruder detection, security and surveillance. Due to various features in WSN it is very prone to various types external attacks. Preventing such attacks, intrusion detection system (IDS) is very important so that attacker cannot steal or manipulate data. Data mining is a technique that can help to discover patterns in large dataset. This paper proposed a data mining technique for different types of classification algorithms to detect four types of Denial of service (DoS) attacks, namely, Grayhole, Blackhole, Flooding and TDMA. A number of data mining techniques, such as KNN, Naïve Bayes, Logistic Regression, Support Vector Machine (SVM) and ANN algorithms are applied on the dataset and analyze their performance in detecting the attacks. The analysis reveals the applicability of these algorithms for detecting and predicting such attacks and can be recommended for network specialist and analysts.

Keywords


Wireless Sensor Network (WSN); Intrusion Detection System (IDS); Class Imbalance; DoS attack;

References


I. F. Akyildiz and M. C. Vuran, Wireless sensor networks. John Wiley & Sons, 2010.

A. H. Farooqi and F. A. Khan, “Intrusion Detection Systems for Wireless Sensor Networks: A Survey,” Springer, Berlin, Heidelberg, 2009, pp. 234–241.

S. Ghosal Amritaand Halder, “Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches,” in Wireless Networks and Security: Issues, Challenges and Research Trends, A.-S. Khan Shafiullahand Khan Pathan, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 329–367.

A. H. Farooqi and F. A. Khan, “A survey of Intrusion Detection Systems for Wireless Sensor Networks,” Int. J. Ad Hoc Ubiquitous Comput., vol. 9, no. 2, p. 69, 2012.

A. Y. Ardiansyah and R. Sarno, “Performance analysis of wireless sensor network with load balancing for data transmission using xbee zb module,” Indonesian Journal of Electrical Engineering and Computer Science, 2019. .

Q. Liao and H. Zhu, “An Energy Balanced Clustering Algorithm Based on LEACH Protocol,” Appl. Mech. Mater., vol. 341–342, pp. 1138–1143, Jul. 2013.

S. Umrao, A. Kumar, and P. Umrao, “Security attacks and their countermeasures along with node replication attack for time synchronization in wireless sensor network,” in International Conference on Advanced Nanomaterials & Emerging Engineering Technologies, 2013, pp. 576–581.

Jalil Jabari Lotf, M. Hosseinzadeh, and R. M. Alguliev, “Hierarchical routing in wireless sensor networks: a survey,” in 2010 2nd International Conference on Computer Engineering and Technology, 2010, pp. V3-650-V3-654.

I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks,” J. Sensors, vol. 2016, pp. 1–16, Sep. 2016.

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. vol.1, p. 10.

A. A. Hussien, S. W. Al-Shammari, and M. J. Marie, “Performance evaluation of wireless sensor networks using LEACH protocol,” Indones. J. Electr. Eng. Comput. Sci., vol. 19, no. 1, pp. 394–408, 2020.

C. Ioannou, V. Vassiliou, and C. Sergiou, “An Intrusion Detection System for Wireless Sensor Networks,” in 2017 24th International Conference on Telecommunications (ICT), 2017, pp. 1–5.

T.-T.-H. Le, T. Park, D. Cho, and H. Kim, “An Effective Classification for DoS Attacks in Wireless Sensor Networks,” in 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018, pp. 689–692.

“Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division.” .

H. Suhaimi, S. I. Suliman, I. Musirin, A. F. Harun, and R. Mohamad, “Network intrusion detection system by using genetic algorithm,” Indones. J. Electr. Eng. Comput. Sci., vol. 16, no. 3, pp. 1593–1599, Dec. 2019.

F. Josephin and N. Ramaraj, “PREVENTION AND DETECTION OF SELECTIVE FORWARDING ATTACK IN WIRELESS SENSOR NETWORKS,” Int. J. Sci. Res. Innov., vol. 1, pp. 12–17, 2016.

A. P. Abidoye and E. O. Ochola, “Denial of Service Attacks in Wireless Sensor Networks with Proposed Countermeasures,” in Information Technology - New Generations, 2018, pp. 185–191.

H. Kalkha, H. Satori, and K. Satori, “Preventing Black Hole Attack in Wireless Sensor Network Using HMM,” in Procedia Computer Science, 2019, vol. 148, pp. 552–561.

A. Ahmed, M. I. Channa, and U. A. Khan, “PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK IN PRESENCE OF GRAYHOLE ATTACK,” QUEST Res. J., vol. 13, no. 1, pp. 1–8, 2014.

L. Coppolino, S. DAntonio, A. Garofalo, and L. Romano, “Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks,” in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013, pp. 247–254.

M. A. Latif and M. Adnan, “ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks,” in 2016 International Conference on Frontiers of Information Technology (FIT), 2016, pp. 35–39.

Ž. Gavrić and D. Simić, “Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks Visión general de los ataques de DOS en redes de sensores inalámbricos y resultados experimentales para la simulación de ataques de interfe,” vol. 38, no. 1, pp. 130–138, 2018.

N. Japkowicz and S. Stephen, “The class imbalance problem: A systematic study,” Intell. Data Anal., vol. 6, no. 5, pp. 429–449, Nov. 2002.

N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique,” J. Artif. Intell. Res., vol. 16, pp. 321–357, Jun. 2002.

“Integration of synthetic minority oversampling technique for imbalanced class | Santoso | Indonesian Journal of Electrical Engineering and Computer Science.” .

N. Lu, Y. Sun, H. Liu, and S. Li, “Intrusion Detection System Based on Evolving Rules for Wireless Sensor Networks,” J. Sensors, vol. 2018, pp. 1–8, Apr. 2018.

M. Ping-ping and Z. Qiu-ping, “Association rules applied to intrusion detection,” Wuhan Univ. J. Nat. Sci., vol. 7, no. 4, pp. 426–430, Dec. 2002.




DOI: http://doi.org/10.11591/ijeecs.v21.i1.pp%25p
Total views : 4 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics