D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

被引:79
作者
Shamshirband, Shahaboddin [1 ,2 ]
Amini, Amineh [3 ]
Anuar, Nor Badrul [2 ]
Kiah, Miss Laiha Mat [2 ]
Teh, Ying Wah [3 ]
Furnell, Steven [4 ]
机构
[1] IAU, Dept Comp Sci, Chalous Branch, Chalous 46615397, Mazandaran, Iran
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[3] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur 50603, Malaysia
[4] Univ Plymouth, Ctr Secur Commun & Network Res CSCAN, Plymouth PL4 8AA, Devon, England
关键词
Imperialist competitive algorithm; Density-based clustering; Fuzzy; Intrusion; WSN; GAME-THEORETIC APPROACH; HEAT-EXCHANGERS; OPTIMIZATION; PROTOCOL; ATTACKS; ICA;
D O I
10.1016/j.measurement.2014.04.034
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a hybrid clustering method is introduced, namely a density-based fuzzy imperialist competitive clustering algorithm (D-FICCA). Hereby, the imperialist competitive algorithm (ICA) is modified with a density-based algorithm and fuzzy logic for optimum clustering in WSNs. A density-based clustering algorithm helps improve the imperialist competitive algorithm for the formation of arbitrary cluster shapes as well as handling noise. The fuzzy logic controller (FLC) assimilates to imperialistic competition by adjusting the fuzzy rules to avoid possible errors of the worst imperialist action selection strategy. The proposed method aims to enhance the accuracy of malicious detection. D-FICCA is evaluated on a publicly available dataset consisting of real measurements collected from sensors deployed at the Intel Berkeley Research Lab. Its performance is compared against existing empirical methods, such as K-MICA, K-mean, and DBSCAN. The results demonstrate that the proposed framework achieves higher detection accuracy 87% and clustering quality 0.99 compared to existing approaches. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:212 / 226
页数:15
相关论文
共 60 条
[1]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[2]   On Density-Based Data Streams Clustering Algorithms: A Survey [J].
Amini, Amineh ;
Teh, Ying Wah ;
Saboohi, Hadi .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) :116-141
[3]  
[Anonymous], 2005, P 28 AUSTR CS C
[4]  
[Anonymous], P 41 ANN HAW INT C S
[5]   A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks [J].
Aslam, Nauman ;
Phillips, William ;
Robertson, William ;
Sivakumar, Shyamala .
INFORMATION FUSION, 2011, 12 (03) :202-212
[6]  
Atashpaz-Gargari E, 2007, IEEE C EVOL COMPUTAT, P4661, DOI 10.1109/cec.2007.4425083
[7]   GMDH-based networks for intelligent intrusion detection [J].
Baig, Zubair A. ;
Sait, Sadiq M. ;
Shaheen, AbdulRahman .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (07) :1731-1740
[8]   A hybrid imperialist competitive algorithm for single-machine scheduling problem with linear earliness and quadratic tardiness penalties [J].
Banisadr, A. H. ;
Zandieh, M. ;
Mahdavi, Iraj .
INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2013, 65 (5-8) :981-989
[9]   Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring [J].
Bekmezci, Ilker ;
Alagoz, Fatih .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (06) :729-747
[10]   Model-based evaluation of clustering validation measures [J].
Brun, Marcel ;
Sima, Chao ;
Hua, Jianping ;
Lowey, James ;
Carroll, Brent ;
Suh, Edward ;
Dougherty, Edward R. .
PATTERN RECOGNITION, 2007, 40 (03) :807-824