Detection of unique delete attack in wireless sensor network using gradient thresholding-long short-term memory algorithm

被引:1
作者
Selvi, Seruvan Tamil [1 ]
Visalakshi, Pandikkannu [2 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Technol, Chennai, Tamil Nadu, India
关键词
deep learning; DELETE attack dataset; gradient thresholding-long short-term memory; intrusion detection systems; wireless sensor network; INTRUSION DETECTION SYSTEMS; PREVENTION; MACHINE;
D O I
10.1002/cpe.7332
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wireless sensor network (WSN) is widely used in many fields, including agriculture, military, healthcare, monitoring, and surveillance. WSN application increases day by day due to growth in embedded and internet technologies. However, data security in WSN is challenging, and different types of attacks are increasing. Traditional intrusion detection methods analyze and identify attacks such as Denial of Service, anomaly detection, wormhole, sybil, and blackhole. Traditional methods never addressed the application layer's novel attack, such as the delete attack. Unique DELETE attack (DA) forms in the application layer and targets web servers and applications. Since unique DA use uniform resource locator requests, distinguishing them from legitimate traffic becomes difficult. The unique DA classify as unique (or) single, multiple, and repeated unique DELETE attacks; for detecting the unique DA types, gradient thresholding-long short-term memory (GT-LSTM) algorithm is proposed using packet per second and traffic rate data in WSN nodes. GT-LSTM algorithm detects unique DA through different thresholding at the training option layer in LSTM. Different gradient thresholding values in LSTM reduce the exploding gradients which fail to detect the unique DA nodes. Gradient thresholding in LSTM layers lies 1 to 3 for detecting unique DELETE attack nodes. The proposed method reduces detection time, improves accuracy, and identifies the hidden node that performs a unique DA in WSN. The unique DELETE Attack identification and performance through the proposed GT-LSTM is analyzed in the NS2 simulation environment and the test bed of WSN. Forms the experimental and simulation results, GT-LSTM performs better than fuzzy, KNN, and linear regression-based intruder detection systems. The proposed algorithm achieves 99% accuracy in detecting the DELETE attack nodes in WSN.
引用
收藏
页数:14
相关论文
共 41 条
[31]   WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks [J].
Singh, Rupinder ;
Singh, Jatinder ;
Singh, Ravinder .
MOBILE INFORMATION SYSTEMS, 2016, 2016
[32]   A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks [J].
Soliman, H. H. ;
Hikal, Noha A. ;
Sakr, Nehal A. .
EGYPTIAN INFORMATICS JOURNAL, 2012, 13 (03) :225-238
[33]   Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN) [J].
Sowah, Robert A. ;
Ofori-Amanfo, Kwadwo B. ;
Mills, Godfrey A. ;
Koumadi, Koudjo M. .
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
[34]   Black Hole along with Other Attacks in MANETs: A Survey [J].
Tseng, Fan-Hsun ;
Chiang, Hua-Pei ;
Chao, Han-Chieh .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (01) :56-78
[35]   Deep Learning Approach for Intelligent Intrusion Detection System [J].
Vinayakumar, R. ;
Alazab, Mamoun ;
Soman, K. P. ;
Poornachandran, Prabaharan ;
Al-Nemrat, Ameer ;
Venkatraman, Sitalakshmi .
IEEE ACCESS, 2019, 7 :41525-41550
[36]   Detection and prevention of spoofing attacks in mobile adhoc networks using hybrid optimization algorithm [J].
Visalakshi, P. ;
Prabakaran, S. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) :1691-1704
[37]   Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection [J].
Wang, Zhendong ;
Zeng, Yong ;
Liu, Yaodi ;
Li, Dahai .
IEEE ACCESS, 2021, 9 :16062-16091
[38]   A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM [J].
Wisanwanichthan, Treepop ;
Thammawichai, Mason .
IEEE ACCESS, 2021, 9 :138432-138450
[39]   An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on CNN and RNN [J].
Yue, Chuan ;
Wang, Lide ;
Wang, Dengrui ;
Duo, Ruifeng ;
Nie, Xiaobo .
IEEE ACCESS, 2021, 9 :59527-59539
[40]   Accurate detection of selective forwarding attack in wireless sensor networks [J].
Zhang, Qiong ;
Zhang, Wenzheng .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (01)