Data mining approach to analyzing intrusion detection of wireless sensor network

Wireless sensor network (WSN) is a collection of wireless sensor nodes which are distributed in nature and a base station where the dispersed nodes are used to monitor and the physical conditions of the environment is recorded and then these data are organized into the base. Its application has been reached out from critical military application such as battlefield surveillance to traffic, health, industrial areas, intruder detection, security and surveillance. Due to various features in WSN it is very prone to various types external attacks. Preventing such attacks, intrusion detection system (IDS) is very important so that attacker cannot steal or manipulate data. Data mining is a technique that can help to discover patterns in large dataset. This paper proposed a data mining technique for different types of classification algorithms to detect denial of service (DoS) attacks which is of four types. They are Grayhole, Blackhole, Flooding and TDMA. A number of data mining techniques, such as KNN, Naive Bayes, Logistic Regression, support vector machine (SVM) and ANN algorithms are applied on the dataset and analyze their performance in detecting the attacks. The analysis reveals the applicability of these algorithms for detecting and predicting such attacks and can be recommended for network specialist and analysts.

[1]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[2]  Nathalie Japkowicz,et al.  The class imbalance problem: A systematic study , 2002, Intell. Data Anal..

[3]  M. Ahsan Latif,et al.  ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks , 2016, 2016 International Conference on Frontiers of Information Technology (FIT).

[5]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[6]  Khalid Satori,et al.  Preventing Black Hole Attack in Wireless Sensor Network Using HMM , 2019, Procedia Computer Science.

[7]  Taehwan Park,et al.  An Effective Classification for DoS Attacks in Wireless Sensor Networks , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).

[8]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[9]  Luigi Coppolino,et al.  Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[10]  Hao Zhu,et al.  An Energy Balanced Clustering Algorithm Based on LEACH Protocol , 2013 .

[11]  Riyanarto Sarno,et al.  Performance analysis of wireless sensor network with load balancing for data transmission using xbee zb module , 2020 .

[12]  Farrukh Aslam Khan,et al.  Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.

[13]  Noviyanti Santoso,et al.  Integration of synthetic minority oversampling technique for imbalanced class , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[14]  Mousa Al-Akhras,et al.  WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.

[15]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[16]  Subir Halder,et al.  Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.

[17]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[18]  Mehdi J. Marie,et al.  Performance evaluation of wireless sensor networks using LEACH protocol , 2020 .

[19]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[20]  Ismail Musirin,et al.  Network intrusion detection system by using genetic algorithm , 2019 .

[21]  Rasim M. Alguliev,et al.  Hierarchical routing in wireless sensor networks: a survey , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[22]  Ademola P. Abidoye,et al.  Denial of Service Attacks in Wireless Sensor Networks with Proposed Countermeasures , 2018 .

[23]  Dejan Simić,et al.  Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks , 2018 .

[24]  Ruirui Zhang,et al.  Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.