WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

被引:192
|
作者
Almomani, Iman [1 ,2 ]
Al-Kasasbeh, Bassam [2 ]
AL-Akhras, Mousa [2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Comp Informat Syst Dept, Comp Sci Dept, Amman, Jordan
[3] Saudi Elect Univ, Coll Computat & Informat, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
LEACH; PROTOCOL; ATTACK;
D O I
10.1155/2016/4731953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Intrusion Detection and Security Mechanisms for Wireless Sensor Networks
    Khan, S.
    Lloret, Jaime
    Loo, Jonathan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [32] Applying an Intrusion Detection Algorithm to Wireless Sensor Networks
    Wang, Qi
    Wang, Shu
    Meng, Zhonglou
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 284 - 287
  • [33] Design of an Intrusion Detection System for Wireless Sensor Networks
    Du, Ye
    Yang, Shuang
    Zhang, Ruhui
    SENSOR LETTERS, 2011, 9 (05) : 2082 - 2086
  • [34] SID: Ship Intrusion Detection with Wireless Sensor Networks
    Luo, Hanjiang
    Wu, Kaishun
    Guo, Zhongwen
    Gu, Lin
    Yang, Zhong
    Ni, Lionel M.
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 879 - 888
  • [35] A lightweight intrusion detection framework for wireless sensor networks
    Hai, Tran Hoang
    Huh, Eui-Nam
    Jo, Minho
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (04): : 559 - 572
  • [36] Intrusion detection in homogeneous and heterogeneous Wireless Sensor Networks
    Wang, Yun
    Wang, Xiaodong
    Xie, Bin
    Wang, Demin
    Agrawal, Dharma P.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (06) : 698 - 711
  • [37] Minimizing the intrusion detection modules in wireless sensor networks
    Hai, Tran Hoang
    Huh, Eui-Nam
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 184 - 189
  • [38] Intrusion Detection System for Wireless Nano Sensor Networks
    Rahim, Aneel
    Malone, Paul
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 327 - 330
  • [39] Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks
    Abdellatif, Takoua
    Rouis, Kais
    Mosbah, Mohamed
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 54 - 59
  • [40] Data Integrity And Intrusion Detection In Wireless Sensor Networks
    Acharya, Rathanakar
    Asha, K.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 462 - +