DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

Abstract Wireless Sensor Networks (WSNs) include small battery-based self-governing devices that are deployed in a distributed manner to supervise the environmental or physical circumstances. The routers and gateways are connected to the deployed nodes to support many real-time applications. Due to open access, the security issue arises in WSN. In this circumstance, the external users can be verified by securing authentication is necessary one. In real-time applications, to achieve secured communication they have made many lightweight authentication mechanisms. But WSNs are highly susceptible to DoS attacks as it lacks the synchronization between nodes during data routing. In this paper, a new lightweight DoS detection scheme Deep Learning-based Defense Mechanism (DLDM) has proposed to detect and isolate the attacks in Data Forwarding Phase (DFP). This paper describes the new algorithm for the successful detection of DoS attacks, such as exhaustion, jamming, homing, and flooding. We conduct extensive simulation experiments that can accurately isolate the adversaries and it is more resilient to DoS attacks. Our proposed simulation result shows that it can achieve a high detection rate, throughput, packet delivery ratio, and accuracy. This also reduces the energy consumption and the false alarm rate.

[1]  Gopinath Ganapathy,et al.  An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment , 2015 .

[2]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[3]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[4]  Ying Lin,et al.  Distributed detection of jamming and defense in wireless sensor networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[5]  Sufian Hameed,et al.  HADEC: Hadoop-based live DDoS detection framework , 2018, EURASIP J. Inf. Secur..

[6]  Andrei V. Gurtov,et al.  Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[7]  Yanbing Liu,et al.  C-RBFNN: A user retweet behavior prediction method for hotspot topics based on improved RBF neural network , 2018, Neurocomputing.

[8]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[9]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[10]  Shambhu Upadhyaya,et al.  Is RSSI a Reliable Parameter in Sensor Localization Algorithms – An Experimental Study , 2009 .

[11]  Ademola P. Abidoye,et al.  DDoS attacks in WSNs: detection and countermeasures , 2017, IET Wirel. Sens. Syst..

[12]  Jianzhong Li,et al.  Target Tracking under Uncertainty in Wireless Sensor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[13]  Paramvir Singh,et al.  User behavior analytics-based classification of application layer HTTP-GET flood attacks , 2018, J. Netw. Comput. Appl..

[14]  Pawel Kulakowski,et al.  Wireless Sensor Network Deployment for Monitoring Wildlife Passages , 2010, Sensors.

[15]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[16]  Sunny Behal,et al.  D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events , 2018, J. Netw. Comput. Appl..

[17]  Brij B. Gupta,et al.  Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.

[18]  Mousa Al-Akhras,et al.  WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.

[19]  Chen Zhang,et al.  A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[20]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[21]  Abhinav Bhandari,et al.  An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks , 2020 .

[22]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  G. R. Kanagachidambaresan,et al.  An energy-aware buffer management (EABM) routing protocol for WSN , 2018, The Journal of Supercomputing.

[24]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[26]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[27]  Gürkan Gür,et al.  Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey , 2017, IEEE Systems Journal.

[28]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[29]  Luca Mainetti,et al.  Evolution of wireless sensor networks towards the Internet of Things: A survey , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[30]  J. K. Kalita,et al.  Botnet in DDoS Attacks: Trends and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[31]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[32]  R AshokkumarS.,et al.  Extreme learning adaptive neuro-fuzzy inference system model for classifying the epilepsy using Q-Tuned wavelet transform , 2020, J. Intell. Fuzzy Syst..

[33]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[34]  Emin Anarim,et al.  Frequency based DDoS attack detection approach using naive Bayes classification , 2016, 2016 39th International Conference on Telecommunications and Signal Processing (TSP).

[35]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[36]  R. Thirukkumaran,et al.  Efficient Broadcast Authentication using TSG Algorithm for WSN , 2012 .