Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms

被引:3
|
作者
John, Ayuba [1 ]
Isnin, Ismail Fauzi Bin [2 ]
Madni, Syed Hamid Hussain [3 ]
Faheem, Muhammed [4 ]
机构
[1] Fed Univ Dutse, Fac Comp, Dutse, Jigawa State, Nigeria
[2] Univ Teknol Malaysia UTM, Fac Comp, Johor Baharu, Malaysia
[3] Univ Southampton, Sch Elect & Comp Sc, Johor Baharu, Malaysia
[4] Univ Vaasa, Sch Technol & Innovat, Vaasa 65200, Finland
来源
关键词
Cluster-based; Wireless sensor network; Machine learning; DoS attacks; Detection system; INTRUSION DETECTION SYSTEM; PREVENTION; SCHEME; DOS;
D O I
10.1016/j.iswa.2024.200381
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A Cluster-Based Wireless Sensor Network (CBWSN) is a system designed to remotely control and monitor specific events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. The wide range of applications of technology in almost every field of human activity exposes it to various security threats from cybercriminals. One of the pressing concerns that requires immediate attention is the risk of security breaches, such as intrusions in wireless sensor network traffic. Poor detection of denial-of-service (DoS) attacks, such as Grayhole, Blackhole, Flooding, and Scheduling attacks, can deplete the energy of sensor nodes. This can cause certain sensor nodes to fail, leading to a degradation in network coverage or lifetime. The detection of such attacks has resulted in significant computational complexity in the related works. As new threats arise, security attacks get more sophisticated, focusing on the target system's vulnerabilities. This paper proposed the development of Cluster-Based Wireless Sensor Network and Variable Selection Ensemble Machine Learning Algorithms (CBWSN_VSEMLA) as a security threats detection system framework for DoS attack detection. The CBWSN model is designed using a Fuzzy C-Means (FCM) clustering technique, whereas VSEMLA is a detection system comprised of Principal Component Analysis (PCA) for feature selection and various ensemble machine learning algorithms (Bagging, LogitBoost, and RandomForest) for the detection of grayhole attacks, blackhole attacks, flooding attacks, and scheduling attacks. The experimental results of the model performance and complexity comparison for DoS attack evaluation using the WSN-DS dataset show that the PCA_RandomForest IDS model outperforms with 99.999 % accuracy, followed by the PCA_Bagging IDS model with 99.78 % accuracy and the PCA_LogitBoost model with 98.88 % accuracy. However, the PCA_RandomForest model has a high computational complexity, taking 231.64 s to train, followed by the PCA_LogitBoost model, which takes 57.44 s to train, and the PCA_Bagging model, which takes 0.91 s to train to be the best in terms of model computational complexity. Thus, the models surpassed all baseline models in terms of model detection accuracy on flooding, scheduling, grayhole, and blackhole attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Traffic Feature Selection and Distributed Denial of Service Attack Detection in Software-Defined Networks Based on Machine Learning
    Han, Daoqi
    Li, Honghui
    Fu, Xueliang
    Zhou, Shuncheng
    SENSORS, 2024, 24 (13)
  • [42] A distributed framework for distributed denial-of-service attack detection in internet of things environments using deep learning
    Silas W.A.
    Nderu L.
    Ndirangu D.
    International Journal of Web Engineering and Technology, 2024, 19 (01) : 67 - 87
  • [43] Machine learning approach for secure communication in wireless video sensor networks against denial-of-service attacks
    Ramesh, Swaminathan
    Yaashuwanth, Calpakkam
    Muthukrishnan, Bala Anand
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (12)
  • [44] Detection of Denial-of-Service Attack Using Weight based Trust Aware Routing Approach
    Dani, Virendra
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (03): : 89 - 97
  • [45] Prevention Mechanism for Infrastructure based Denial-of-Service attack over Software Defined Network
    Singh, Sandeep
    Khan, R. A.
    Agrawal, Alka
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 348 - 353
  • [46] A denial-of-service attack on fiber-based continuous-variable quantum key distribution
    Li, Yuan
    Huang, Peng
    Wang, Shiyu
    Wang, Tao
    Li, Dengwen
    Zeng, Guihua
    PHYSICS LETTERS A, 2018, 382 (45) : 3253 - 3261
  • [47] A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
    Chen, Chin-Ling
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 488 - 504
  • [48] Distributed denial-of-service attack detection scheme-based joint-entropy
    Rahmani, Hamza
    Sahli, Nabil
    Kamoun, Farouk
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) : 1049 - 1061
  • [49] Cluster-Based Rendezvous Routing Protocol for Wireless Sensor Network
    Lenka, Rakesh Kumar
    Aggarwal, Arushi
    Rath, Amiya
    Sharma, Suraj
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 748 - 752
  • [50] Collaborative Signal Processing Cluster-based in Wireless Sensor Network
    Yan, Dongmei
    Wang, Jinkuan
    Liu, Li
    Gao, Jing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3684 - +