A novel density estimation based intrusion detection technique with Pearson's divergence for Wireless Sensor Networks

被引:20
作者
Gavel, Shashank [1 ]
Raghuvanshi, Ajay Singh [1 ]
Tiwari, Sudarshan [2 ]
机构
[1] Natl Inst Technol Raipur, Dept Elect & Telecommun, Raipur, Madhya Pradesh, India
[2] Motilal Nehru Natl Inst Technol Allahabad, Dept Elect & Commun, Prayagraj, Uttar Pradesh, India
关键词
WSN; Wireless Sensor Networks; Kernel based density estimation; Anomaly and intrusion detection; Distributed and centralized computing; Pearson?s divergence; ANOMALY DETECTION; OUTLIER DETECTION; DETECTION SYSTEM; ENTROPY; STATISTICS; ALGORITHM;
D O I
10.1016/j.isatra.2020.11.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a novel technique to detect an intrusive attack that occurs in the network due to the presence of a compromised node. These intrusive attacks last for a long time in the network due to the existence of compromised nodes this also affects the sensor reading. As the time span of the attack in longer in the network, it affects the system and can cause a system failure. Hence, we propose a technique that uses the combination of multi-varying kernel density estimation with distributed computing. This combination analyzes the individual probability of the existence of data and calculates the global value of the Probability Density Function (PDFs). Pearson's divergence (PE) is applied for efficient in-network detection and estimation of intrusion at low False Positive Rate (FPRs). The approximation of PE divergence is carried out using different techniques of distributed computing. The value of PDFs is calculated for a successive period of time in order to provide efficient performance. We also propose an entropy-based method that uses a centralized computing approach. Results obtained using PE divergence and entropy-based method are compared in order to judge the robustness. Finally, the proposed algorithms are evaluated using real-world based datasets, and the results are compared using Accuracy and FPRs. (C) 2020 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:180 / 191
页数:12
相关论文
共 43 条
[21]   Image matching using alpha-entropy measures and entropic graphs [J].
Neemuchwala, H ;
Hero, A ;
Carson, P .
SIGNAL PROCESSING, 2005, 85 (02) :277-296
[22]   An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks [J].
Ngai, Edith C. H. ;
Liu, Jiangchuan ;
Lyu, Michael R. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2353-2364
[23]  
Rajagopalan S, 2006, 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, P151
[24]   A survey of network-based intrusion detection data sets [J].
Ring, Markus ;
Wunderlich, Sarah ;
Scheuring, Deniz ;
Landes, Dieter ;
Hotho, Andreas .
COMPUTERS & SECURITY, 2019, 86 :147-167
[25]   Localised gear anomaly detection without historical data for reference density estimation [J].
Schmidt, Stephan ;
Heyns, P. Stephan .
MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2019, 121 :615-635
[26]  
Scott DW, 2015, WILEY SER PROBAB ST, P1, DOI 10.1002/9781118575574
[27]   D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks [J].
Shamshirband, Shahaboddin ;
Amini, Amineh ;
Anuar, Nor Badrul ;
Kiah, Miss Laiha Mat ;
Teh, Ying Wah ;
Furnell, Steven .
MEASUREMENT, 2014, 55 :212-226
[28]   A Deep Learning Approach to Network Intrusion Detection [J].
Shone, Nathan ;
Tran Nguyen Ngoc ;
Vu Dinh Phai ;
Shi, Qi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2018, 2 (01) :41-50
[29]   Entropy-Based Anomaly Detection in a Network [J].
Shukla, Ajay Shankar ;
Maurya, Rohit .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) :1487-1501
[30]   Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks [J].
Singh, Khundrakpam Johnson ;
Thongam, Khelchandra ;
De, Tanmay .
ENTROPY, 2016, 18 (10)