Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network

Wireless networks are increasingly overwhelmed by Distributed Denial of Service DDoS attacks by generating flooding packets that exhaust critical computing and communication resources of a victim's mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier, with less computational complexity, and an accurate decision making to stunt such attacks. We propose a distributed intrusion detection system called Cooperative IDS to protect wireless nodes within the network and target nodes from DDoS attacks by using a Cooperative Fuzzy Q-learning Co-FQL optimization algorithmic technique to identify the attack patterns and take appropriate countermeasures. The Co-FQL algorithm was trained and tested to establish its performance by generating attacks from the NSL-KDD and “CAIDA DDoS Attack 2007” datasets during the simulation experiments. Experimental results show that the proposed Co-FQL IDS has a 90.58% higher accuracy of detection rate than Fuzzy Logic Controller or Q-learning algorithm or Fuzzy Q-learning alone.

[1]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[2]  Juan Vicente Capella,et al.  In-line monitoring of chemical-analysis processes using Wireless Sensor Networks , 2012 .

[3]  Jiankun Hu,et al.  A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..

[4]  Maziar Palhang,et al.  Multi-criteria expertness based cooperative Q-learning , 2012, Applied Intelligence.

[5]  Joel J. P. C. Rodrigues,et al.  Toward ubiquitous mobility solutions for body sensor networks on healthcare , 2012, IEEE Communications Magazine.

[6]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[7]  S. Selvakumar,et al.  Distributed denial of service attack detection using an ensemble of neural classifier , 2011, Comput. Commun..

[8]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[9]  Geng Yang,et al.  An intelligent method for real-time detection of DDoS attack based on fuzzy logic , 2008 .

[10]  Jesús Alcalá-Fdez,et al.  jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation , 2012, 2012 IEEE International Conference on Fuzzy Systems.

[11]  Peng Ning,et al.  Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks , 2012, Ad Hoc Networks.

[12]  Özgür Ulusoy,et al.  A framework for use of wireless sensor networks in forest fire detection and monitoring , 2012, Comput. Environ. Urban Syst..

[13]  Raquel Barco,et al.  Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..

[14]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[15]  Nirwan Ansari,et al.  Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..

[16]  Nandita Sengupta,et al.  Designing of on line intrusion detection system using rough set theory and Q-learning algorithm , 2013, Neurocomputing.

[17]  Levente Buttyán,et al.  Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.