On the Feasibility of Deep Learning in Sensor Network Intrusion Detection

In this letter, we present a comprehensive analysis of the use of machine and deep learning (DL) solutions for IDS systems in wireless sensor networks (WSNs). To accomplish this, we introduce restricted Boltzmann machine-based clustered IDS (RBC-IDS), a potential DL-based IDS methodology for monitoring critical infrastructures by WSNs. We study the performance of RBC-IDS, and compare it to the previously proposed adaptive machine learning-based IDS: the adaptively supervised and clustered hybrid IDS (ASCH-IDS). Numerical results show that RBC-IDS and ASCH-IDS achieve the same detection and accuracy rates, though the detection time of RBC-IDS is approximately twice that of ASCH-IDS.

[1]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[2]  Bilal Maqbool Beigh,et al.  Performance evaluation of different intrusion detection system: An empirical approach , 2014, 2014 International Conference on Computer Communication and Informatics.

[3]  Ridha Bouallegue,et al.  An optimized weight-based clustering algorithm in wireless sensor networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[4]  Carla Purdy,et al.  Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[5]  Md. Enamul Haque,et al.  Adaptive Hybrid Model for Network Intrusion Detection and Comparison among Machine Learning Algorithms , 2015 .

[6]  Hesham N. Elmahdy,et al.  A New Approach for Evaluating Intrusion Detection System , 2010 .

[7]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[8]  Sanghyun Seo,et al.  Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).

[9]  Md Zahangir Alom,et al.  Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[10]  Burak Kantarci,et al.  Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.

[11]  Miguel Correia,et al.  A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection , 2017, IWANN.

[12]  Heba F. Eid,et al.  Hybrid Intelligent Intrusion Detection Scheme , 2011 .

[13]  Mahesh Chandra Govil,et al.  A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[14]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[15]  H. T. Mouftah,et al.  Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures , 2018, 2018 IEEE International Conference on Communications (ICC).

[16]  Nicholas D. Lane,et al.  Can Deep Learning Revolutionize Mobile Sensing? , 2015, HotMobile.