Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

被引:31
作者
Salmi, Salim [1 ]
Oughdir, Lahcen [1 ]
机构
[1] Sidi Mohamed Ben Abdellah Univ, ENSA, Engn Syst & Applicat Lab, Fes, Morocco
关键词
Wireless sensor networks (WSNs); Intrusion detection system (IDS); Denial of service (DOS); Deep learning (DL); INTRUSION DETECTION;
D O I
10.1186/s40537-023-00692-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used remotely to collect data about the activities and conditions of a particular area, for example, temperature, pressure, motion. Each sensor node is usually small, inexpensive, and relatively easy to deploy compared to other sensing methods. For this reason, WSNs are used in a wide range of applications and industries. However, WSNs are vulnerable to different kinds of security threats and attacks. This is primarily because they are very limited in resources like power, storage, bandwidth, and processing power that could have been used in developing their defense. To ensure their security, an effective Intrusion detection system (IDS) need to be in place to detect these attacks even under these constraints. Today, traditional IDS are less effective as these malicious attacks are becoming more intelligent, frequent, and complex. Denial of service (DOS) attack is one of the main types of attacks that threaten WSNs. For this reason, we review related works that focus on detecting DoS attacks in WSN. In addition, we developed and implemented several Deep learning (DL) based IDS. These systems were trained on a specialized dataset for WSNs called WSN-DS in detecting four types of DoS attacks that affects WSNs. They include the Blackhole, Grayhole, Flooding, and Scheduling attacks. Finally, we evaluated and compared the results and we discuss possible future works.
引用
收藏
页数:25
相关论文
共 47 条
  • [1] Abdullah M. A., 2018, Journal of fundamental and Applied Sciences, V10, P298
  • [2] Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
    Al-Shalabi, Mohammed
    Anbar, Mohammed
    Wan, Tat-Chee
    Khasawneh, Ahmad
    [J]. ELECTRONICS, 2018, 7 (08)
  • [3] Efficient Denial of Service Attacks Detection in Wireless Sensor Networks
    Almomani, Iman
    Alenezi, Mamdouh
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 977 - 1000
  • [4] WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
    Almomani, Iman
    Al-Kasasbeh, Bassam
    AL-Akhras, Mousa
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [5] Composite and efficient DDoS attack detection framework for B5G networks
    Amaizu, G. C.
    Nwakanma, C., I
    Bhardwaj, S.
    Lee, J. M.
    Kim, D. S.
    [J]. COMPUTER NETWORKS, 2021, 188
  • [6] Amma NGB, 2018, TENCON IEEE REGION, P0640, DOI 10.1109/TENCON.2018.8650225
  • [7] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    [J]. COMPUTER JOURNAL, 2020, 63 (07) : 983 - 994
  • [8] Ashoor Asmaa Shaker, 2011, INT J SCI ENG RES, V2, P1
  • [9] A GRU deep learning system against attacks in software defined networks
    Assis, Marcos V. O.
    Carvalho, Luiz F.
    Lloret, Jaime
    Proenca, Mario L.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 177
  • [10] Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    [J]. IEEE ACCESS, 2020, 8 : 181916 - 181929