A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks

With the increase of cyber attack risks on critical infrastructures monitored by networked systems, robust Intrusion Detection Systems (IDSs) for protecting the information have become vital. Designing an IDS that performs with maximum accuracy with minimum false alarms is a challenging task. Ensemble method considered as one of the main developments in machine learning in the past decade, it finds an accurate classifier by combining many classifiers. In this paper, an ensemble classification procedure is proposed using Random Forest (RF), DensityBased Spatial Clustering of Applications with Noise (DBSCAN) and Restricted Boltzmann Machine (RBM) as base classifiers. RF, DBSCAN, and RBM techniques have been used for classification purposes. The ensemble model is introduced for achieving better results. Bayesian Combination Classification (BCC) has been adopted as a combination technique. Independent BCC (IBCC) and Dependent BCC (DBCC) have been tested for performance comparison. The model shows a promising result for all classes of attacks. DBCC performs over IBCC in terms of accuracy and detection rates. Through simulations under a wireless sensor network scenario, we have verified that DBCC-based IDS works with $\approx 100\%$ detection and $\approx 1.0$ accuracy rate in the existence of intrusive behavior in the tested Wireless Sensor Network (WSN).

[1]  Aidong Zhang,et al.  An adaptive density-based clustering algorithm for spatial database with noise , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[2]  Burak Kantarci,et al.  On the Feasibility of Deep Learning in Sensor Network Intrusion Detection , 2019, IEEE Networking Letters.

[3]  Md Zahangir Alom,et al.  Network intrusion detection for cyber security using unsupervised deep learning approaches , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).

[4]  Stephen J. Roberts,et al.  Dynamic Bayesian Combination of Multiple Imperfect Classifiers , 2012, Decision Making and Imperfection.

[5]  Pierre-François Marteau,et al.  Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset , 2018, 2018 1st International Conference on Data Intelligence and Security (ICDIS).

[6]  Christopher Krügel,et al.  A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.

[7]  Sanghyun Seo,et al.  Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).

[8]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[9]  Hyun-Chul Kim,et al.  Bayesian Classifier Combination , 2012, AISTATS.

[10]  Dandan Liu,et al.  DL-IDS: a deep learning-based intrusion detection framework for securing IoT , 2019, Trans. Emerg. Telecommun. Technol..

[11]  Gulshan Kumar,et al.  The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.

[12]  Bilal Maqbool Beigh,et al.  Performance evaluation of different intrusion detection system: An empirical approach , 2014, 2014 International Conference on Computer Communication and Informatics.

[13]  Amparo Alonso-Betanzos,et al.  Conversion methods for symbolic features: A comparison applied to an intrusion detection problem , 2009, Expert Syst. Appl..

[14]  Mamun Bin Ibne Reaz,et al.  A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..

[15]  M. Govindarajan,et al.  Evaluation of Ensemble Classifiers for Intrusion Detection , 2016 .

[16]  Shian-Shyong Tseng,et al.  Two-phase clustering process for outliers detection , 2001, Pattern Recognit. Lett..

[17]  H. T. Mouftah,et al.  Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[18]  Thar Baker,et al.  Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.

[19]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[20]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[21]  Ridwan Nur Wibowo,et al.  NSL-KDD Dataset , 2019 .

[22]  Zhen Liu,et al.  SmoteAdaNL: a learning method for network traffic classification , 2016, J. Ambient Intell. Humaniz. Comput..

[23]  Burak Kantarci,et al.  Machine Learning-based Prevention of Battery-oriented Illegitimate Task Injection in Mobile Crowdsensing , 2019, WiseML@WiSec.

[24]  Yaser Jararweh,et al.  An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.

[25]  Sidi-Mohammed Senouci,et al.  Recent advances on security and privacy in intelligent transportation systems (ITSs) , 2019, Ad Hoc Networks.

[26]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.