D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

Abstract Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a hybrid clustering method is introduced, namely a density-based fuzzy imperialist competitive clustering algorithm (D-FICCA). Hereby, the imperialist competitive algorithm (ICA) is modified with a density-based algorithm and fuzzy logic for optimum clustering in WSNs. A density-based clustering algorithm helps improve the imperialist competitive algorithm for the formation of arbitrary cluster shapes as well as handling noise. The fuzzy logic controller (FLC) assimilates to imperialistic competition by adjusting the fuzzy rules to avoid possible errors of the worst imperialist action selection strategy. The proposed method aims to enhance the accuracy of malicious detection. D-FICCA is evaluated on a publicly available dataset consisting of real measurements collected from sensors deployed at the Intel Berkeley Research Lab. Its performance is compared against existing empirical methods, such as K-MICA, K-mean, and DBSCAN. The results demonstrate that the proposed framework achieves higher detection accuracy 87% and clustering quality 0.99 compared to existing approaches.

[1]  John M. Hancock,et al.  K -Means Clustering. , 2010 .

[2]  Ali S. Hadi,et al.  Finding Groups in Data: An Introduction to Chster Analysis , 1991 .

[3]  Andries P. Engelbrecht,et al.  Computational Intelligence: An Introduction , 2002 .

[4]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[5]  Philippe Owezarski,et al.  Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..

[6]  Kemal Ertugrul Tepe,et al.  Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.

[7]  Haibin Duan,et al.  Imperialist competitive algorithm optimized artificial neural networks for UCAV global path planning , 2014, Neurocomputing.

[8]  Reza Tavakkoli-Moghaddam,et al.  A new support vector model-based imperialist competitive algorithm for time estimation in new product development projects , 2013 .

[9]  Abdul Hanan Abdullah,et al.  Imperialist competitive algorithm combined with refined high-order weighted fuzzy time series (RHWFTS-ICA) for short term load forecasting , 2013 .

[10]  Junichi Suzuki,et al.  MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[11]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[12]  Hans-Peter Kriegel,et al.  Density-Based Clustering in Spatial Databases: The Algorithm GDBSCAN and Its Applications , 1998, Data Mining and Knowledge Discovery.

[13]  Kamran Rezaie,et al.  Solving the integrated product mix-outsourcing problem using the Imperialist Competitive Algorithm , 2010, Expert Syst. Appl..

[14]  Giandomenico Spezzano,et al.  A single pass algorithm for clustering evolving data streams based on swarm intelligence , 2011, Data Mining and Knowledge Discovery.

[15]  Xin Jin,et al.  K-Means Clustering , 2010, Encyclopedia of Machine Learning.

[16]  Edward R. Dougherty,et al.  Model-based evaluation of clustering validation measures , 2007, Pattern Recognit..

[17]  Martin Ester,et al.  Density‐based clustering , 2019, WIREs Data Mining Knowl. Discov..

[18]  Fariborz Jolai,et al.  A hybrid imperialist competitive algorithm for minimizing makespan in a multi-processor open shop , 2013 .

[19]  Ilker Bekmezci,et al.  Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.

[20]  Nitesh Sinha,et al.  A fully automated algorithm under modified FCM framework for improved brain MR image segmentation. , 2009, Magnetic resonance imaging.

[21]  Levente Buttyán,et al.  Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.

[22]  Jing Li,et al.  A new hybrid method based on partitioning-based DBSCAN and ant clustering , 2011, Expert Syst. Appl..

[23]  Hung Q. Ngo,et al.  A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.

[24]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[25]  Won Suk Lee,et al.  Optimized Clustering for Anomaly Intrusion Detection , 2003, PAKDD.

[26]  Mutlu Mete,et al.  Fast density-based lesion detection in dermoscopy images , 2011, Comput. Medical Imaging Graph..

[27]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[28]  Marimuthu Palaniswami,et al.  Labelled data collection for anomaly detection in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[29]  Zubair A. Baig,et al.  GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..

[30]  Aoying Zhou,et al.  Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.

[31]  Witold Pedrycz,et al.  Anomaly detection in time series data using a fuzzy c-means clustering , 2013, 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS).

[32]  S. Selvakumar,et al.  Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..

[33]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[34]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[35]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[36]  Zahir Tari,et al.  Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling , 2013, J. Parallel Distributed Comput..

[37]  Christian Böhm,et al.  Automated detection of brain atrophy patterns based on MRI for the prediction of Alzheimer's disease , 2010, NeuroImage.

[38]  Taher Niknam,et al.  An efficient hybrid algorithm based on modified imperialist competitive algorithm and K-means for data clustering , 2011, Eng. Appl. Artif. Intell..

[39]  Abdul Hanan Abdullah,et al.  Optimization of plate-fin heat exchangers by an improved harmony search algorithm , 2013 .

[40]  Ying Wah Teh,et al.  On Density-Based Data Streams Clustering Algorithms: A Survey , 2014, Journal of Computer Science and Technology.

[41]  Amin Hadidi,et al.  A new design approach for shell-and-tube heat exchangers using imperialist competitive algorithm (ICA) from economic point of view , 2013 .

[42]  Nauman Aslam,et al.  A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.

[43]  Caro Lucas,et al.  Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition , 2007, 2007 IEEE Congress on Evolutionary Computation.

[44]  Jing Liu,et al.  Outlier detection on uncertain data based on local information , 2013, Knowl. Based Syst..

[45]  Yi-Ming Chen,et al.  Combining density-based clustering and wavelet methods for internal systems anomaly detection , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.

[46]  Mostafa Zandieh,et al.  A hybrid imperialist competitive algorithm for single-machine scheduling problem with linear earliness and quadratic tardiness penalties , 2013 .

[47]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..

[48]  Mahmut C. Selekoglu,et al.  How to be Energy Efficient , 2008 .

[49]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..

[50]  Christopher Leckie,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[51]  Yanheng Liu,et al.  Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..

[52]  Abdul Hanan Abdullah,et al.  A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption , 2013 .

[53]  Yin Wang,et al.  Hybrid bio-inspired lateral inhibition and Imperialist Competitive Algorithm for complicated image matching , 2014 .

[54]  Daniel A. Keim,et al.  An Efficient Approach to Clustering in Large Multimedia Databases with Noise , 1998, KDD.

[55]  Abdul Hanan Abdullah,et al.  MOICA: A novel multi-objective approach based on imperialist competitive algorithm , 2013, Appl. Math. Comput..

[57]  Nirwan Ansari,et al.  Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..

[58]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[59]  C. Guestrin,et al.  Distributed regression: an efficient framework for modeling sensor network data , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[60]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..