WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

被引:192
作者
Almomani, Iman [1 ,2 ]
Al-Kasasbeh, Bassam [2 ]
AL-Akhras, Mousa [2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Comp Informat Syst Dept, Comp Sci Dept, Amman, Jordan
[3] Saudi Elect Univ, Coll Computat & Informat, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
LEACH; PROTOCOL; ATTACK;
D O I
10.1155/2016/4731953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
引用
收藏
页数:16
相关论文
共 45 条
  • [21] Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]
  • [22] Heiniger R. W., 2000, Proceedings of the 5th International Conference on Precision Agriculture, Bloomington, Minnesota, USA, 16-19 July, 2000, P1
  • [23] An application-specific protocol architecture for wireless microsensor networks
    Heinzelman, WB
    Chandrakasan, AP
    Balakrishnan, H
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) : 660 - 670
  • [24] Jadidoleslamy: H., 2011, Wireless Sensor Network, V3, P241, DOI DOI 10.4236/WSN.2011.37026
  • [25] Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks
    Kumar, Dilip
    [J]. IET WIRELESS SENSOR SYSTEMS, 2014, 4 (01) : 9 - 16
  • [26] Liu HF, 2006, LECT NOTES COMPUT SC, V4159, P429
  • [27] Magotra S, 2014, IEEE INT ADV COMPUT, P193, DOI 10.1109/IAdCC.2014.6779319
  • [28] Mansouri D, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P2214
  • [29] Marriwala N, 2012, PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, P495, DOI 10.1109/WICT.2012.6409128
  • [30] Mitrokotsa A, 2008, CRYPTOL INF SEC SER, V1, P251