DoS attack detection using online learning techniques in wireless sensor networks

被引:5
|
作者
Lai, Trinh Thuc [1 ]
Tran, Tuan Phong [1 ]
Cho, Jaehyuk [2 ]
Yoo, Myungsik [3 ]
机构
[1] Soongsil Univ, Dept Informat Commun Convergence Technol, Seoul, South Korea
[2] Jeonbuk Natl Univ, Dept Software Engn, Seoul, South Korea
[3] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
关键词
Wireless sensor network; Denial-of-service; Attack detection; Machine learning; Feature selection; Passive-aggressive online learning; INTRUSION DETECTION; ANOMALY DETECTION; ALGORITHMS; PROTOCOL;
D O I
10.1016/j.aej.2023.11.022
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor network (WSN) models pose substantial security vulnerabilities since most WSNs are deployed in unattended hostile environments. This research focuses on denial-of-service (DoS) attack detection, a crucial problem in WSN security. Previous research has mostly focused on offline machine learning algorithms, which require long-term data collection and cannot continually adapt to new data. Online learning is thus more suitable for detecting DoS attacks in WSN due to the benefit of continuous improvement with fresh data. Nevertheless, existing online DoS attack detection algorithms do not take internal and external data interference into consideration. Thus, noisy data might have a negative effect on the performance of the model. Moreover, the data includes features that are redundant or unnecessary for the classification. Hence, the selection of proper features not only decreases computational time but also improves the performance of the model. This study proposes an online-learning-based approach for detecting DoS attacks in WSN. Specifically, a feature selection method is proposed to identify the most appropriate attributes for the training process. Furthermore, a noise-tolerant online passive-aggressive multi-class classifier is also developed. The performance of our proposed method is investigated in terms of accuracy, precision, recall, and F1-score, and it proves to be competitive.
引用
收藏
页码:307 / 319
页数:13
相关论文
共 50 条
  • [21] DoS attack detection scheme for sensor networks based on traffic prediction
    National Laboratory of Novel Software Technology, Nanjing University, Nanjing 210093, China
    不详
    不详
    Jisuanji Xuebao, 2007, 10 (1798-1805):
  • [22] IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks
    Shakya, Vandana
    Choudhary, Jaytrilok
    Singh, Dhirendra Pratap
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (28) : 71559 - 71578
  • [23] A Paradigm for DoS Attack Disclosure using Machine Learning Techniques
    Abualhaj, Mosleh M.
    Abu-Shareha, Ahmad Adel
    Hiari, Mohammad O.
    Alrabanah, Yousef
    Al-Zyoud, Mahran
    Alsharaiah, Mohammad A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 192 - 200
  • [24] Secure localization with attack detection in wireless sensor networks
    Wen Tao Zhu
    Yang Xiang
    Jianying Zhou
    Robert H. Deng
    Feng Bao
    International Journal of Information Security, 2011, 10 : 155 - 171
  • [25] A wormhole attack detection algorithm in wireless sensor networks
    Dong, X.-M. (dongxiaomei@ise.neu.edu.cn), 1600, Northeast University (33):
  • [26] Detection & Prevention of Vampire Attack in Wireless Sensor Networks
    Sharma, Mayank Kumar
    Joshi, Brijendra Kumar
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [27] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [28] Secure localization with attack detection in wireless sensor networks
    Zhu, Wen Tao
    Xiang, Yang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (03) : 155 - 171
  • [29] Detection of Masked Replication Attack in Wireless Sensor Networks
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohamad Naufal Mohamad
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [30] On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
    Ngai, Edith C. H.
    Liu, Jiangchuan
    Lyu, Michael R.
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3383 - 3389