WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

被引:192
|
作者
Almomani, Iman [1 ,2 ]
Al-Kasasbeh, Bassam [2 ]
AL-Akhras, Mousa [2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Comp Informat Syst Dept, Comp Sci Dept, Amman, Jordan
[3] Saudi Elect Univ, Coll Computat & Informat, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
LEACH; PROTOCOL; ATTACK;
D O I
10.1155/2016/4731953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Cooperative Intrusion Detection in Wireless Sensor Networks
    Krontiris, Ioannis
    Benenson, Zinaida
    Giannetsos, Thanassis
    Freiling, Felix C.
    Dimitriou, Tassos
    WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2009, 5432 : 263 - +
  • [22] Anomaly intrusion detection in wireless sensor networks
    Bhuse, V
    Gupta, A
    JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (01) : 33 - 51
  • [23] An Intrusion Detection System for Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    Sergiou, Charalampos
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [24] Research on Intrusion Detection of Wireless Sensor Networks
    Guo, Jianli
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 65 - 69
  • [25] Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks
    Derhab, Abdelouahid
    Bouras, Abdelghani
    Senouci, Mustapha Reda
    Imran, Muhammad
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [26] Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
    Alrajeh, Nabil Ali
    Lloret, J.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [27] Intrusion detection systems for wireless sensor networks using computational intelligence techniques
    Vaishnavi Sivagaminathan
    Manmohan Sharma
    Santosh Kumar Henge
    Cybersecurity, 6
  • [28] Distributed Intrusion Detection Systems for enhancing security in mobile Wireless Sensor Networks
    Mostarda, Leonardo
    Navarra, Alfredo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2008, 4 (02) : 83 - 109
  • [29] A Security Metric for the Evaluation of Collaborative Intrusion Detection Systems in Wireless Sensor Networks
    Ramos, Alex
    Lazar, Marcella
    Holanda Filho, Raimir
    Rodrigues, Joel J. P. C.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [30] Intrusion detection systems for wireless sensor networks using computational intelligence techniques
    Sivagaminathan, Vaishnavi
    Sharma, Manmohan
    Henge, Santosh Kumar
    CYBERSECURITY, 2023, 6 (01)