Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures

Wireless sensor networks have become integral components of the monitoring systems for critical infrastructures such as the power grid or residential microgrids. Therefore, implementation of robust Intrusion Detection Systems (IDS) at the sensory data aggregation stage has become of paramount importance. Key performance targets for IDS in these environments involve accuracy, precision, and the receiver operating characteristics which is a function of the sensitivity and the ratio of false alarms. Furthermore, the interplay between machine learning and networked systems has led to promising opportunities, particularly for the system level security of wireless sensor networks. Pursuant to these, in this paper, we propose Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS) for wirelessly connected sensor clusters that monitor critical infrastructures. The proposed ASCH-IDS mechanism is built on a hybrid IDS framework, and transforms the previous work by continuously monitoring the behavior of the receiver operating characteristics, and adaptively directing the incoming packets at a sensor cluster towards either misuse detection or anomaly detection module. We evaluate the proposed mechanism by introducing real attack data sets into simulations, and show that our proposal performs at 98.9% detection rate and approximately 99.80% overall accuracy to detect known and unknown malicious behavior in the sensor network.

[1]  K. Raghuveer,et al.  Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers , 2013, 2013 International Conference on Computer Communication and Informatics.

[2]  Jeremy Straub,et al.  Testing automation for an intrusion detection system , 2017, 2017 IEEE AUTOTESTCON.

[3]  Annie George,et al.  Anomaly Detection based on Machine Learning Dimensionality Reduction using PCA and Classification using SVM , 2012 .

[4]  Sushanta Karmakar,et al.  A Neural Network based system for Intrusion Detection and attack classification , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[5]  Maen Alzubi,et al.  Evaluation of machine learning algorithms for intrusion detection system , 2017, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY).

[6]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[7]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[8]  Salvatore J. Stolfo,et al.  Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems , 2002 .

[9]  Peter Mark Jansson,et al.  Application of power sensors in the control and monitoring of a residential microgrid , 2015, 2015 IEEE Sensors Applications Symposium (SAS).

[10]  H. T. Mouftah,et al.  Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  H. T. Mouftah,et al.  Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring , 2017, 2017 IEEE International Conference on Communications (ICC).

[12]  Aidong Zhang,et al.  An adaptive density-based clustering algorithm for spatial database with noise , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[13]  Vaibhav Fanibhare,et al.  Energy theft detection using AMIDS and cryptographic protection in smart grids , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[14]  Xin Wang,et al.  Efficient Sensor Selection Schemes for Wireless Sensor Networks in Microgrid , 2018, IEEE Systems Journal.

[15]  Hesham N. Elmahdy,et al.  A New Approach for Evaluating Intrusion Detection System , 2010 .

[16]  Mikael Gidlund,et al.  Detecting communication blackout in industrial Wireless Sensor Networks , 2016, 2016 IEEE World Conference on Factory Communication Systems (WFCS).

[17]  Fulufhelo Vincent Nelwamondo,et al.  A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack , 2017, ACIIDS.

[18]  Ridha Bouallegue,et al.  An optimized weight-based clustering algorithm in wireless sensor networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  K. Jayshree,et al.  Intrusion Detection Using Data Mining Approach , 2014 .

[20]  Burak Kantarci,et al.  Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.

[21]  Mohammad Zulkernine,et al.  Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[22]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .