Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms

被引:3
|
作者
John, Ayuba [1 ]
Isnin, Ismail Fauzi Bin [2 ]
Madni, Syed Hamid Hussain [3 ]
Faheem, Muhammed [4 ]
机构
[1] Fed Univ Dutse, Fac Comp, Dutse, Jigawa State, Nigeria
[2] Univ Teknol Malaysia UTM, Fac Comp, Johor Baharu, Malaysia
[3] Univ Southampton, Sch Elect & Comp Sc, Johor Baharu, Malaysia
[4] Univ Vaasa, Sch Technol & Innovat, Vaasa 65200, Finland
来源
关键词
Cluster-based; Wireless sensor network; Machine learning; DoS attacks; Detection system; INTRUSION DETECTION SYSTEM; PREVENTION; SCHEME; DOS;
D O I
10.1016/j.iswa.2024.200381
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A Cluster-Based Wireless Sensor Network (CBWSN) is a system designed to remotely control and monitor specific events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. The wide range of applications of technology in almost every field of human activity exposes it to various security threats from cybercriminals. One of the pressing concerns that requires immediate attention is the risk of security breaches, such as intrusions in wireless sensor network traffic. Poor detection of denial-of-service (DoS) attacks, such as Grayhole, Blackhole, Flooding, and Scheduling attacks, can deplete the energy of sensor nodes. This can cause certain sensor nodes to fail, leading to a degradation in network coverage or lifetime. The detection of such attacks has resulted in significant computational complexity in the related works. As new threats arise, security attacks get more sophisticated, focusing on the target system's vulnerabilities. This paper proposed the development of Cluster-Based Wireless Sensor Network and Variable Selection Ensemble Machine Learning Algorithms (CBWSN_VSEMLA) as a security threats detection system framework for DoS attack detection. The CBWSN model is designed using a Fuzzy C-Means (FCM) clustering technique, whereas VSEMLA is a detection system comprised of Principal Component Analysis (PCA) for feature selection and various ensemble machine learning algorithms (Bagging, LogitBoost, and RandomForest) for the detection of grayhole attacks, blackhole attacks, flooding attacks, and scheduling attacks. The experimental results of the model performance and complexity comparison for DoS attack evaluation using the WSN-DS dataset show that the PCA_RandomForest IDS model outperforms with 99.999 % accuracy, followed by the PCA_Bagging IDS model with 99.78 % accuracy and the PCA_LogitBoost model with 98.88 % accuracy. However, the PCA_RandomForest model has a high computational complexity, taking 231.64 s to train, followed by the PCA_LogitBoost model, which takes 57.44 s to train, and the PCA_Bagging model, which takes 0.91 s to train to be the best in terms of model computational complexity. Thus, the models surpassed all baseline models in terms of model detection accuracy on flooding, scheduling, grayhole, and blackhole attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Tensor based framework for Distributed Denial of Service attack detection
    Maranhao, Joao Paulo A.
    da Costa, Joao Paulo C. L.
    Javidi, Elnaz
    Borges de Andrade, Cesar A.
    de Sousa Jr, Rafael T.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 174
  • [32] Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine
    Imamverdiyev, Yadigar
    Abdullayeva, Fargana
    BIG DATA, 2018, 6 (02) : 159 - 169
  • [33] Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network
    Suryaprabha, E.
    Kumar, N. M. Saravana
    SOFT COMPUTING, 2020, 24 (14) : 10681 - 10691
  • [34] TCP based denial-of-service attacks to edge network: Analysis and detection
    Kumar, VA
    Sisalem, D
    INTELLIGENT INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, 3356 : 214 - 223
  • [35] Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms
    Li, Zhuolin
    Zhang, Hao
    Shahriar, Hossain
    Lo, Dan
    Qian, Kai
    Whitman, Michael
    Wu, Fan
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 469 - 474
  • [36] Cluster-based service discovery for heterogeneous wireless sensor networks
    Marin-Perianu, R. S.
    Scholten, J.
    Havinga, P. J. M.
    Hartel, P. H.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2008, 23 (04) : 325 - 346
  • [37] Fuzzy logic-based jamming detection algorithm for cluster-based wireless sensor network
    Vijayakumar, K. P.
    Ganeshkumar, P.
    Anandaraj, M.
    Selvaraj, K.
    Sivakumar, P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [38] Machine Learning Methods Assessment for Denial of Service Detection in Wireless Sensor Networks
    Quincozes, Silvio E.
    Kazienko, Juliano F.
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [39] Optimum Cluster Size for Cluster-Based Communication in Wireless Sensor Network
    Chakraborty, Goutam
    UBICOMM 2010: THE FOURTH INTERNATIONAL CONFERENCE ON MOBILE UBIQUITOUS COMPUTING, SYSTEMS, SERVICES AND TECHNOLOGIES, 2010, : 328 - 333
  • [40] Algorithms for Relay Node Selection in Randomly Deployed Homogenous Cluster-based Wireless Sensor Networks
    Aslam, Nauman
    Robertson, William
    Phillips, William
    AD HOC & SENSOR WIRELESS NETWORKS, 2009, 8 (1-2) : 5 - 20