A Graph-based Approach to Detect DoB Attack

被引:0
|
作者
Thomas, Diya [1 ]
机构
[1] Macquarie Univ, N Ryde, NSW, Australia
关键词
Anomaly detection; DoB; Dynamic Graph; Security; WSN;
D O I
10.1109/PERCOMWORKSHOPS51409.2021.9430971
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are underlying network infrastructure for a variety of surveillance applications. The network should be tolerant of unexpected failures of sensor nodes to meet the Quality of Service (QoS) requirements of these applications. One major cause of failure is active security attacks such as Depletion-of-Battery (DoB) attacks. This paper model the problem of detecting such attacks as an anomaly detection problem in a dynamic graph. The problem is addressed by employing a cluster ensemble approach called the K-Means Spectral and Hierarchical ensemble (KSH) approach. The experimental result shows that KSH detected DoB attacks with better accuracy when compared to baseline approaches.
引用
收藏
页码:422 / 423
页数:2
相关论文
共 50 条
  • [31] Graph-based Approach to Reliability Assessment
    Sinitca, Aleksandr M.
    Shalugin, Evgeniy D.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 682 - 685
  • [32] A graph-based approach to auditing RxNorm
    Bodenreider, Olivier
    Peters, Lee B.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2009, 42 (03) : 558 - 570
  • [33] A graph-based approach for POCL planning
    Sebastia, L
    Onaindia, E
    Marzal, E
    ECAI 2000: 14TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2000, 54 : 531 - 535
  • [34] A GRAPH-BASED APPROACH TO CONTEXT MATCHING
    Olaru, Andrei
    Florea, Adina Magda
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2010, 11 (04): : 393 - 399
  • [35] Graph-Based Methods to Detect Hate Speech Diffusion on Twitter
    Beatty, Matthew
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2020, : 502 - 506
  • [36] High-quality attack graph-based IDS correlation
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 571 - 591
  • [37] Analysis of Attack Graph-based Metrics for Quantification of Network Security
    Kundu, Arkadeep
    Ghosh, Nirnay
    Chokshi, Ishan
    Ghosh, Soumya K.
    2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
  • [38] Dealing with the unevenness: deeper insights in graph-based attack and defense
    Haoxi Zhan
    Xiaobing Pei
    Machine Learning, 2024, 113 : 2921 - 2953
  • [39] Extending Attack Graph-Based Security Metrics and Aggregating Their Application
    Idika, Nwokedi
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 75 - 85
  • [40] Dealing with the unevenness: deeper insights in graph-based attack and defense
    Zhan, Haoxi
    Pei, Xiaobing
    MACHINE LEARNING, 2024, 113 (05) : 2921 - 2953