Detection of unique delete attack in wireless sensor network using gradient thresholding-long short-term memory algorithm

被引:1
作者
Selvi, Seruvan Tamil [1 ]
Visalakshi, Pandikkannu [2 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Technol, Chennai, Tamil Nadu, India
关键词
deep learning; DELETE attack dataset; gradient thresholding-long short-term memory; intrusion detection systems; wireless sensor network; INTRUSION DETECTION SYSTEMS; PREVENTION; MACHINE;
D O I
10.1002/cpe.7332
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wireless sensor network (WSN) is widely used in many fields, including agriculture, military, healthcare, monitoring, and surveillance. WSN application increases day by day due to growth in embedded and internet technologies. However, data security in WSN is challenging, and different types of attacks are increasing. Traditional intrusion detection methods analyze and identify attacks such as Denial of Service, anomaly detection, wormhole, sybil, and blackhole. Traditional methods never addressed the application layer's novel attack, such as the delete attack. Unique DELETE attack (DA) forms in the application layer and targets web servers and applications. Since unique DA use uniform resource locator requests, distinguishing them from legitimate traffic becomes difficult. The unique DA classify as unique (or) single, multiple, and repeated unique DELETE attacks; for detecting the unique DA types, gradient thresholding-long short-term memory (GT-LSTM) algorithm is proposed using packet per second and traffic rate data in WSN nodes. GT-LSTM algorithm detects unique DA through different thresholding at the training option layer in LSTM. Different gradient thresholding values in LSTM reduce the exploding gradients which fail to detect the unique DA nodes. Gradient thresholding in LSTM layers lies 1 to 3 for detecting unique DELETE attack nodes. The proposed method reduces detection time, improves accuracy, and identifies the hidden node that performs a unique DA in WSN. The unique DELETE Attack identification and performance through the proposed GT-LSTM is analyzed in the NS2 simulation environment and the test bed of WSN. Forms the experimental and simulation results, GT-LSTM performs better than fuzzy, KNN, and linear regression-based intruder detection systems. The proposed algorithm achieves 99% accuracy in detecting the DELETE attack nodes in WSN.
引用
收藏
页数:14
相关论文
共 41 条
  • [1] Abdaljabar ZH, 2021, 2021 INTERNATIONAL CONFERENCE OF MODERN TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY (MTICTI 2021), P139, DOI 10.1109/MTICTI53925.2021.9664772
  • [2] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
    Abduvaliyev, Abror
    Pathan, Al-Sakib Khan
    Zhou, Jianying
    Roman, Rodrigo
    Wong, Wai-Choong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
  • [3] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [4] Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. COMPLEXITY, 2021, 2021
  • [5] Intrusion Detection Systems in Wireless Sensor Networks: A Review
    Alrajeh, Nabil Ali
    Khan, S.
    Shams, Bilal
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [6] Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks
    Alzahrani, Abdulsalam O.
    Alenazi, Mohammed J. E.
    [J]. FUTURE INTERNET, 2021, 13 (05)
  • [7] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) : 266 - 282
  • [8] El Mourabit Y, 2015, INT J ADV COMPUT SC, V6, P164
  • [9] El Mourabit Y, 2014, 2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), P248, DOI 10.1109/ICoCS.2014.7060910
  • [10] Farooq Y, 2019, 2019 2 INT C LAT TRE, P1, DOI [10.1109/INTELLECT47034.2019.8954984, DOI 10.1109/INTELLECT47034.2019.8954984]