Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks

Multi-hop wireless mesh networks WMNs are increasingly growing interest as a promising technology for high-speed network access. WMNs are integrated with other networks such as Internet, sensor networks, and cellular networks through gateways. Therefore gateways in WMNs are prone to various security threads and can be easily exploited by the attacker from any part of the Internet to launch a distributed flooding attack to compromise computer systems, affect the network performance, and destruct the services. Many approaches have been proposed by researchers in this regard but still more efforts are needed in terms of accuracy and efficiency. In this research paper, we will propose an artificial neural network-based technique for detection of distributed flooding attacks to things such as sensors or actuators in WMNs called the distributed flood attack detector. In our simulation, sample dataset used to train and test the artificial neural network is generated using NS-2 network simulator. Simulation results and real system implementation proved that the distributed flood attack detector can be used in a real network environment to detect the intermediate and severe distributed flood attacks with low-false positive and false-negative rates. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Ramón Agüero,et al.  TCP Performance Enhancement over Wireless Mesh Networks by means of the Combination of Multi-RAT Devices and the MPTCP Protocol , 2014, Netw. Protoc. Algorithms.

[2]  Tahseen Ahmed Jilani,et al.  Feature Deduction and Ensemble Design of Parallel Neural Networks for Intrusion Detection System , 2010 .

[3]  M. Uysal,et al.  DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.

[4]  Chunming Qiao,et al.  Signaling and Routing Protocols for iCAR , 2007, Ad Hoc Sens. Wirel. Networks.

[5]  Monica Mehrotra,et al.  Anomaly Intrusion Detection System using Hamming Network Approach , 2010 .

[6]  Jonathan Loo,et al.  Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting , 2014, Ad Hoc Sens. Wirel. Networks.

[7]  Jonathan Loo,et al.  Framework for intrusion detection in IEEE 802.11 wireless mesh networks , 2010, Int. Arab J. Inf. Technol..

[8]  Lília de Sá Silva,et al.  Detecting attack signatures in the real network traffic with ANNIDA , 2008, Expert Syst. Appl..

[9]  Jonathan Loo,et al.  Intrusion Detection and Security Mechanisms for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[10]  Radhika Priya Ankala,et al.  Mobile Agent Based Routing in Manets - Attacks & Defences , 2011, Netw. Protoc. Algorithms.

[11]  Rosli Salleh,et al.  Security Overview of Wireless Sensor Network , 2013 .

[12]  Azizah Abdul Rahman,et al.  Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents , 2010, ArXiv.

[13]  Mulhim Al Doori,et al.  Credit Scoring Model Based on Back Propagation Neural Network Using Various Activation and Error Function , 2014 .

[14]  Elijah Blessing Rajsingh,et al.  Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks , 2012 .

[15]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[16]  R.V. Yampolskiy,et al.  ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION , 2006, 2006 IEEE Long Island Systems, Applications and Technology Conference.

[17]  S. Selvakumar,et al.  M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems , 2012 .

[18]  Nadeem Javaid,et al.  iAMCTD: Improved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[19]  B. B. Gupta,et al.  ANN Based Scheme to Predict Number of Zombies in a DDoS Attack , 2012, Int. J. Netw. Secur..

[20]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[21]  B. M. Patil,et al.  Low-rate DDOS Attack Detection using Optimal Objective Entropy Method , 2013 .

[22]  Miguel Garcia,et al.  Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks , 2011, J. Netw. Comput. Appl..

[23]  David Wetherall,et al.  TVA: a DoS-limiting network architecture , 2008, TNET.

[24]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[25]  Andrew R. Barron,et al.  Universal approximation bounds for superpositions of a sigmoidal function , 1993, IEEE Trans. Inf. Theory.

[26]  Erol Gelenbe,et al.  Learning in the Recurrent Random Neural Network , 1992, Neural Computation.

[27]  Georgios Loukas,et al.  A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network , 2007, Comput. J..

[28]  Kok-Keong Loo,et al.  Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .

[29]  Claude E. Shannon,et al.  The mathematical theory of communication , 1950 .

[30]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[31]  P. V. G. D. Prasad Reddy,et al.  Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks , 2011, Netw. Protoc. Algorithms.

[32]  S. Selvakumar,et al.  Distributed denial of service attack detection using an ensemble of neural classifier , 2011, Comput. Commun..

[33]  Selen Cremaschi,et al.  An algorithm to determine sample sizes for optimization with artificial neural networks , 2013 .

[34]  Virendra Raghuwanshi,et al.  Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique , 2011, Netw. Protoc. Algorithms.

[35]  P. Venkata Krishna,et al.  An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..

[36]  Geert Deconinck,et al.  Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..

[37]  Abdelhakim Hafid,et al.  Wireless Mesh Networks Design — A Survey , 2012, IEEE Communications Surveys & Tutorials.