AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

被引:3
作者
Das, Soumadeep [1 ]
Pasikhani, Aryan Mohammadi [1 ]
Gope, Prosanta [1 ]
Clark, John [1 ]
Patel, Chintan [1 ]
Sikdar, Biplab [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, England
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119077, Singapore
基金
英国工程与自然科学研究理事会;
关键词
Underwater acoustic sensor networks; intrusion detection systems; incremental machine learning; concept-drift detection; CHALLENGES;
D O I
10.1109/TNET.2023.3313156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone to vulnerabilities. This paper proposes an Adaptive decentralised Intrusion Detection and Prevention System called AIDPS for UW-ASNs. The proposed AIDPS can improve the security of the UW-ASNs so that they can efficiently detect underwater-related attacks (e.g., blackhole, grayhole and flooding attacks). To determine the most effective configuration of the proposed construction, we conduct a number of experiments using several state-of-the-art machine learning algorithms (e.g., Adaptive Random Forest (ARF), light gradient-boosting machine, and K-nearest neighbours) and concept drift detection algorithms (e.g., ADWIN, kdqTree, and Page-Hinkley). Our experimental results show that incremental ARF using ADWIN provides optimal performance when implemented with One-class support vector machine (SVM) anomaly-based detectors. Furthermore, our extensive evaluation results also show that the proposed scheme outperforms state-of-the-art bench-marking methods while providing a wider range of desirable features such as scalability and complexity.
引用
收藏
页码:1080 / 1095
页数:16
相关论文
共 35 条
[1]   Classification of DoS Attacks in Smart Underwater Wireless Sensor Network [J].
Ahmad, Bilal ;
Jian, Wang ;
Enam, Rabia Noor ;
Abbas, Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) :1055-1069
[2]   A comprehensive deep learning benchmark for IoT IDS [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
COMPUTERS & SECURITY, 2022, 114
[3]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[4]  
Anish Halimaa A., 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P916, DOI 10.1109/ICOEI.2019.8862784
[5]  
[Anonymous], 2008, P IEEE GLOBECOM GLOB, DOI DOI 10.1109/GLOCOM.2008.ECP.16
[6]   Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks [J].
Ayaz, Muhammad ;
Abdullah, Azween .
2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, :436-441
[7]  
Berlian MH, 2016, 2016 INTERNATIONAL ELECTRONICS SYMPOSIUM (IES), P403, DOI 10.1109/ELECSYM.2016.7861040
[8]  
Bhairavi R., 2018, J ENG SCI TECHNOL RE, V11, P10
[9]  
Bifet A, 2009, LECT NOTES COMPUT SC, V5772, P249, DOI 10.1007/978-3-642-03915-7_22
[10]  
Costin Andrei, 2018, 2018 10th International Conference on Electronics, Computers andArtificial Intelligence (ECAI), V1, P1