DoS attack detection using online learning techniques in wireless sensor networks

被引:5
作者
Lai, Trinh Thuc [1 ]
Tran, Tuan Phong [1 ]
Cho, Jaehyuk [2 ]
Yoo, Myungsik [3 ]
机构
[1] Soongsil Univ, Dept Informat Commun Convergence Technol, Seoul, South Korea
[2] Jeonbuk Natl Univ, Dept Software Engn, Seoul, South Korea
[3] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
关键词
Wireless sensor network; Denial-of-service; Attack detection; Machine learning; Feature selection; Passive-aggressive online learning; INTRUSION DETECTION; ANOMALY DETECTION; ALGORITHMS; PROTOCOL;
D O I
10.1016/j.aej.2023.11.022
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor network (WSN) models pose substantial security vulnerabilities since most WSNs are deployed in unattended hostile environments. This research focuses on denial-of-service (DoS) attack detection, a crucial problem in WSN security. Previous research has mostly focused on offline machine learning algorithms, which require long-term data collection and cannot continually adapt to new data. Online learning is thus more suitable for detecting DoS attacks in WSN due to the benefit of continuous improvement with fresh data. Nevertheless, existing online DoS attack detection algorithms do not take internal and external data interference into consideration. Thus, noisy data might have a negative effect on the performance of the model. Moreover, the data includes features that are redundant or unnecessary for the classification. Hence, the selection of proper features not only decreases computational time but also improves the performance of the model. This study proposes an online-learning-based approach for detecting DoS attacks in WSN. Specifically, a feature selection method is proposed to identify the most appropriate attributes for the training process. Furthermore, a noise-tolerant online passive-aggressive multi-class classifier is also developed. The performance of our proposed method is investigated in terms of accuracy, precision, recall, and F1-score, and it proves to be competitive.
引用
收藏
页码:307 / 319
页数:13
相关论文
共 32 条
  • [1] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [2] WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
    Almomani, Iman
    Al-Kasasbeh, Bassam
    AL-Akhras, Mousa
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [3] Arora M, 2020, P 3 ACM INDIA JOINT
  • [4] A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept
    Borkar, Gautam M.
    Patil, Leena H.
    Dalgade, Dilip
    Hutke, Ankush
    [J]. SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2019, 23 (120-135) : 120 - 135
  • [5] Spatial anomaly detection in sensor networks using neighborhood information
    Bosman, Hedde H. W. J.
    Iacca, Giovanni
    Tejada, Arturo
    Wortche, Heinrich J.
    Liotta, Antonio
    [J]. INFORMATION FUSION, 2017, 33 : 41 - 56
  • [6] Ensembles of incremental learners to detect anomalies in ad hoc sensor networks
    Bosman, Hedde H. W. J.
    Iacca, Giovanni
    Tejada, Arturo
    Wortche, Heinrich J.
    Liotta, Antonio
    [J]. AD HOC NETWORKS, 2015, 35 : 14 - 36
  • [7] Crammer K, 2006, J MACH LEARN RES, V7, P551
  • [8] A Genetic Algorithm based Pilot Assignment strategy for Cell-Free massive MIMO system
    Dang, Xuan-Toan
    Lai-Thuc, Trinh
    Nguyen, Anh-Tuan
    Vu-Huy, Tung
    Tran, N. Hung Anh
    Han, Huy-Dung
    [J]. IEEE ICCE 2020: 2020 IEEE EIGHTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2021, : 93 - 98
  • [9] Gumus F, 2014, 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), P670, DOI 10.1109/ASONAM.2014.6921657
  • [10] An application-specific protocol architecture for wireless microsensor networks
    Heinzelman, WB
    Chandrakasan, AP
    Balakrishnan, H
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) : 660 - 670