AN ONLINE ENSEMBLE LEARNING MODEL FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORKS

被引:0
|
作者
Tabbaa, Hiba [1 ]
Ifzarne, Samir [1 ]
Hafidi, Imad [1 ]
机构
[1] Univ Sultan Moulay Slimane, Lab Proc Engn Comp Sci & Math LIPIM, Khouribga, Morocco
关键词
Wireless sensor networks; attack detection; network security; intrusion detection system; ensemble learning; online learning; streaming data; CLASSIFICATION;
D O I
10.31577/cai202341013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's modern world, the usage of technology is unavoidable, and the rapid advances in the Internet and communication fields have resulted in the expansion of wireless sensor network (WSN) technology. However, WSN has been proven to be vulnerable to security breaches. The harsh and unattended deploy-ment of these networks, combined with their constrained resources and the volume of data generated, introduces a major security concern. WSN applications are extremely critical, it is essential to build reliable solutions that involve fast and continuous mechanisms for online stream analysis, allowing the identification of at-tacks and intrusions. Our aim is to develop an intelligent and efficient intrusion detection system by applying an important machine learning concept known as ensemble learning in order to improve detection performance. Although ensemble models have been proven to be useful in offline learning, they have received less attention in streaming applications. In this paper, we examine the application of different homogeneous and heterogeneous online ensembles in sensory data analy-sis on a specialized WSN detection system (WSN-DS) dataset in order to classify four types of attacks: Blackhole attack, Grayhole, Flooding, and Scheduling among normal network traffic. Among the proposed novel online ensembles, both the het-erogeneous ensemble consisting of an Adaptive Random Forest (ARF) combined with the Hoeffding Adaptive Tree (HAT) algorithm and the homogeneous ensemble HAT made up of 10 models achieved higher detection rates of 96.84 % and 97.2 %, respectively. The above models are efficient and effective in dealing with concept drift while taking into account WSN resource constraints.
引用
收藏
页码:1013 / 1036
页数:24
相关论文
共 50 条
  • [21] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [22] Online Fusion of Incremental Learning for Wireless Sensor Networks
    Bosman, H. H. W. J.
    Iacca, G.
    Wortche, H. J.
    Liotta, A.
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 525 - 532
  • [23] Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks
    R. S. Raghav
    Kalaipriyan Thirugnansambandam
    Dinesh Kumar Anguraj
    Wireless Personal Communications, 2020, 112 : 2439 - 2459
  • [24] SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks
    Sujihelen, L.
    Jayakumar, C.
    Senthilsingh, C.
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2447 - 2455
  • [25] Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks
    Raghav, R. S.
    Thirugnansambandam, Kalaipriyan
    Anguraj, Dinesh Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2439 - 2459
  • [26] Detecting Sybil Attacks in Mobile Wireless Sensor Networks Based on ID Frequency
    Cheng, Ying-ying
    Huang, He-jiao
    Du, Hong-wei
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 330 - 334
  • [27] DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS
    Yao, Lan
    Zhao, Zhibin
    Yu, Ge
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01) : 229 - 243
  • [28] Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
    Zhang, Ming
    Khanapure, Vishal
    Chen, Shigang
    Xiao, Xuelian
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 284 - 293
  • [29] Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
    Baig, Z. A.
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 468 - 484
  • [30] Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
    Dallas, Daniel
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 132 - 137