An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks

被引:14
作者
Quincozes, Silvio E. [1 ,4 ]
Kazienko, Juliano F. [2 ]
Quincozes, Vagner E. [3 ]
机构
[1] Fed Univ Uberlandia UFU, Uberlandia, MG, Brazil
[2] Univ Fed Santa Maria UFSM, Santa Maria, RS, Brazil
[3] Univ Fed Pampa UNIPAMPA, Alegrete, RS, Brazil
[4] Univ Fed Uberlandia, Fac Comp FACOM, Bloco 1AMC, BR-38500000 Monte Carmelo, MG, Brazil
关键词
Evaluation; Machine learning; Supervised and unsupervised learning; Security; WSN; DoS; INTRUSION DETECTION; ALGORITHMS; CLASSIFICATION;
D O I
10.1016/j.iot.2023.100684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the research efforts in the last years, Denial-of-Service (DoS) attacks detection still represent a challenge for the Internet of Things (IoT) scenarios composed of hard-constrained networks, as Wireless Sensor Networks (WSN). Machine Learning (ML) techniques have been presented as a promising alternative for detecting DoS attacks. Therefore, understanding the impact of the different ML techniques in a comprehensive way is quite important. In this work, we present an extended evaluation covering both supervised and unsupervised ML techniques considering three feature selection algorithms. Our experiments are based on Flooding, Grayhole, and Blackhole DoS attacks from a public WSN-based dataset. As an additional contribution, we investigate the adjustable parameter K to maximize the performance of unsupervised techniques. Experimental comparison is guided by the accuracy, recall, precision, F1-Score, and processing time metrics. Results reveal that, among the studied ML algorithms, the supervised techniques present better performance than the unsupervised ones: the highest F1-Score (95.69%) was obtained by the REPTree with the OneR feature selection algorithm for detecting blackhole attacks. In general, supervised techniques are faster than unsupervised. REPTree is the fastest, spending 0.931 & mu;s on average to classify a sample.
引用
收藏
页数:16
相关论文
共 45 条
[1]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[2]  
Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
[3]  
Aksu Dogukan, 2018, Computer and Information Sciences: 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018. Communications in Computer and Information Science (935), P141, DOI 10.1007/978-3-030-00840-6_16
[4]  
Al-Ahmadi S., 2021, INT J NETW SECUR APP, V13, P1
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   Efficient Denial of Service Attacks Detection in Wireless Sensor Networks [J].
Almomani, Iman ;
Alenezi, Mamdouh .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) :977-1000
[7]   WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks [J].
Almomani, Iman ;
Al-Kasasbeh, Bassam ;
AL-Akhras, Mousa .
JOURNAL OF SENSORS, 2016, 2016
[8]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[9]   Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks [J].
Anthi, Eirini ;
Williams, Lowri ;
Laved, Amir ;
Burnap, Pete .
COMPUTERS & SECURITY, 2021, 108
[10]   Comparison of classification techniques applied for network intrusion detection and classification [J].
Aziz, Amira Sayed A. ;
EL-Ola Hanafi, Sanaa ;
Hassanien, Aboul Ella .
JOURNAL OF APPLIED LOGIC, 2017, 24 :109-118