A Brief Study on Different Intrusions and Machine Learning-Based Anomaly Detection Methods in Wireless Sensor Networks

Wireless Sensor Networks (WSN) consist of a number of resource constrained sensors to collect and monitor data from unattended environments. Hence, security is a crucial task as the nodes are not provided with tamper-resistance hardware. Provision for secured communication in WSN is a challenging task especially due to the environment in which they are deployed. One of the main challenges is detection of intrusions. Intrusion detection system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches. Different intrusion detection methods have been proposed in the literature to identify attacks in the network. Out of these detection methods, machine-learning based methods are observed to be efficient in terms of detection accuracy and alert generations for the system to act immediately. A brief study on different intrusions along with the machine learning based anomaly detection methods are reviewed in this work. The study also classifies the machine learning algorithms into supervised, unsupervised and semi-supervised learning-based anomaly detection. The performances of the algorithms are compared and efficient methods are identified.

[1]  Anazida Zainal,et al.  An Efficient Distributed Anomaly Detection Model for Wireless Sensor Networks , 2013 .

[2]  Youlin Shang,et al.  Semi-supervised outlier detection based on fuzzy rough C-means clustering , 2010, Math. Comput. Simul..

[3]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[4]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[5]  Anazida Zainal,et al.  Adaptive and online data anomaly detection for wireless sensor systems , 2014, Knowl. Based Syst..

[6]  Safiqul Islam,et al.  Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .

[7]  Chih-Fong Tsai,et al.  A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..

[8]  Wei Hu,et al.  AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[9]  Marimuthu Palaniswami,et al.  Hyperspherical cluster based distributed anomaly detection in wireless sensor networks , 2014, J. Parallel Distributed Comput..

[10]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[11]  Di He,et al.  A probability approach to anomaly detection with twin support vector machines , 2010 .

[12]  Hui Wang,et al.  A novel intrusion detection method based on improved SVM by combining PCA and PSO , 2011, Wuhan University Journal of Natural Sciences.

[13]  Jun Gao,et al.  Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.

[14]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[15]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[16]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..