WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

被引:192
|
作者
Almomani, Iman [1 ,2 ]
Al-Kasasbeh, Bassam [2 ]
AL-Akhras, Mousa [2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Comp Informat Syst Dept, Comp Sci Dept, Amman, Jordan
[3] Saudi Elect Univ, Coll Computat & Informat, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
LEACH; PROTOCOL; ATTACK;
D O I
10.1155/2016/4731953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset
    Singh, Neha
    Virmani, Deepali
    Gao, Xiao-Zhi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2020, 19 (03)
  • [2] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Can, Okan
    Sahingoz, Ozgur Koray
    2015 6TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2015,
  • [3] A survey of Intrusion Detection Systems for Wireless Sensor Networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (02) : 69 - 83
  • [4] Improving Intrusion Detection Systems for Wireless Sensor Networks
    Stetsko, Andriy
    Smolka, Tobias
    Matyas, Vashek
    Stehlik, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 343 - 360
  • [5] Applying Intrusion Detection Systems to Wireless Sensor Networks
    Roman, Rodrigo
    Zhou, Jianying
    Lopez, Javier
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 640 - +
  • [6] Intrusion Detection Systems in Wireless Sensor Networks: A Review
    Alrajeh, Nabil Ali
    Khan, S.
    Shams, Bilal
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [7] Intrusion Detection Systems for Wireless Sensor Networks: A Survey
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    COMMUNICATION AND NETWORKING, 2009, 56 : 234 - 241
  • [8] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 266 - 282
  • [9] A Dataset for Evaluating Intrusion Detection Systems in IEEE 802.11 Wireless Networks
    Vilela, Douglas W. F. L.
    Ferreira, Ed' Wilson T.
    Shinoda, Ailton Akira
    Araujo, Nelcileno V. de Souza
    de Oliveira, Ruy
    Nascimento, Valtemir E.
    2014 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2014,
  • [10] Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
    Darra, Eleni
    Katsikas, Sokratis K.
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 91 - 97