Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms

被引:5
作者
John, Ayuba [1 ]
Isnin, Ismail Fauzi Bin [2 ]
Madni, Syed Hamid Hussain [3 ]
Faheem, Muhammed [4 ]
机构
[1] Fed Univ Dutse, Fac Comp, Dutse, Jigawa State, Nigeria
[2] Univ Teknol Malaysia UTM, Fac Comp, Johor Baharu, Malaysia
[3] Univ Southampton, Sch Elect & Comp Sc, Johor Baharu, Malaysia
[4] Univ Vaasa, Sch Technol & Innovat, Vaasa 65200, Finland
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2024年 / 22卷
关键词
Cluster-based; Wireless sensor network; Machine learning; DoS attacks; Detection system; INTRUSION DETECTION SYSTEM; PREVENTION; SCHEME; DOS;
D O I
10.1016/j.iswa.2024.200381
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A Cluster-Based Wireless Sensor Network (CBWSN) is a system designed to remotely control and monitor specific events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. The wide range of applications of technology in almost every field of human activity exposes it to various security threats from cybercriminals. One of the pressing concerns that requires immediate attention is the risk of security breaches, such as intrusions in wireless sensor network traffic. Poor detection of denial-of-service (DoS) attacks, such as Grayhole, Blackhole, Flooding, and Scheduling attacks, can deplete the energy of sensor nodes. This can cause certain sensor nodes to fail, leading to a degradation in network coverage or lifetime. The detection of such attacks has resulted in significant computational complexity in the related works. As new threats arise, security attacks get more sophisticated, focusing on the target system's vulnerabilities. This paper proposed the development of Cluster-Based Wireless Sensor Network and Variable Selection Ensemble Machine Learning Algorithms (CBWSN_VSEMLA) as a security threats detection system framework for DoS attack detection. The CBWSN model is designed using a Fuzzy C-Means (FCM) clustering technique, whereas VSEMLA is a detection system comprised of Principal Component Analysis (PCA) for feature selection and various ensemble machine learning algorithms (Bagging, LogitBoost, and RandomForest) for the detection of grayhole attacks, blackhole attacks, flooding attacks, and scheduling attacks. The experimental results of the model performance and complexity comparison for DoS attack evaluation using the WSN-DS dataset show that the PCA_RandomForest IDS model outperforms with 99.999 % accuracy, followed by the PCA_Bagging IDS model with 99.78 % accuracy and the PCA_LogitBoost model with 98.88 % accuracy. However, the PCA_RandomForest model has a high computational complexity, taking 231.64 s to train, followed by the PCA_LogitBoost model, which takes 57.44 s to train, and the PCA_Bagging model, which takes 0.91 s to train to be the best in terms of model computational complexity. Thus, the models surpassed all baseline models in terms of model detection accuracy on flooding, scheduling, grayhole, and blackhole attacks.
引用
收藏
页数:12
相关论文
共 50 条
[1]   WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks [J].
Almomani, Iman ;
Al-Kasasbeh, Bassam ;
AL-Akhras, Mousa .
JOURNAL OF SENSORS, 2016, 2016
[2]   Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks [J].
Amma, Bhuvaneswari N. G. ;
Selvakumar, S. .
NEUROCOMPUTING, 2019, 340 :294-308
[3]   Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network [J].
Basan, Alexander ;
Basan, Elena ;
Makarevich, Oleg .
SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, :116-122
[4]  
Bhushan B., 2020, HDB COMPUTER NETWORK, P683
[5]   Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions [J].
Boubiche, Djallel Eddine ;
Athmani, Samir ;
Boubiche, Sabrina ;
Toral-Cruz, Homero .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) :177-213
[6]   Secure synchronization control for a class of complex time-Delay dynamic networks against denial-of-service attacks [J].
Cheng, Yunjia ;
Zhang, Ruimei ;
Liu, Yajuan ;
Xiao, Jianying .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (11) :7535-7558
[7]  
Dai Jianjian, 2018, Procedia Computer Science, V131, P1113, DOI 10.1016/j.procs.2018.04.275
[8]   DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges [J].
Eliyan, Lubna Fayez ;
Di Pietro, Roberto .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 122 (122) :149-171
[9]   An optimized collaborative intrusion detection system for wireless sensor networks [J].
Elsaid, Shaimaa Ahmed ;
Albatati, Nouf Saleh .
SOFT COMPUTING, 2020, 24 (16) :12553-12567
[10]   TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing [J].
Fang, Weidong ;
Zhang, Wuxiong ;
Chen, Wei ;
Liu, Yang ;
Tang, Chaogang .
WIRELESS NETWORKS, 2020, 26 (05) :3169-3182