WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

被引:192
|
作者
Almomani, Iman [1 ,2 ]
Al-Kasasbeh, Bassam [2 ]
AL-Akhras, Mousa [2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol KASIT, Comp Informat Syst Dept, Comp Sci Dept, Amman, Jordan
[3] Saudi Elect Univ, Coll Computat & Informat, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
LEACH; PROTOCOL; ATTACK;
D O I
10.1155/2016/4731953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Intrusion Detection in Gaussian Distributed Wireless Sensor Networks
    Wang, Yun
    Fu, Weihuang
    Agrawal, Dharma P.
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 494 - 502
  • [42] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6
  • [43] A novel intrusion detection framework for wireless sensor networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    Wang, Jin
    Lee, Sungyoung
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 907 - 919
  • [44] Intrusion Detection System in Wireless Sensor Networks: A Review
    Ananthakumar, Anush
    Ganediwal, Tanmay
    Kunte, Ashwini
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 131 - 139
  • [45] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161
  • [46] Intrusion Detection in Wireless Sensor Networks for Destructive Intruders
    Yu, Qixiang
    Luo, Zhenxing
    Min, Paul
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 68 - 75
  • [47] Efficient monitoring for intrusion detection in wireless sensor networks
    Abdellatif, Takoua
    Mosbah, Mohamed
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15):
  • [48] A Hierarchical Intrusion Detection System in Wireless Sensor Networks
    Islam, Md. Safiqul
    Khan, Razib Hayat
    Bappy, Dewan Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 21 - 26
  • [49] Lightweight anomaly intrusion detection in wireless sensor networks
    Chen, Haiguang
    Han, Peng
    Zhou, Xi
    Gao, Chuanshan
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 105 - +
  • [50] Lightweight intrusion detection scheme for wireless sensor networks
    Maleh, Yassine
    Ezzati, A.
    IAENG International Journal of Computer Science, 2015, 42 (04) : 347 - 354