Skip to main content
Erschienen in: Wireless Personal Communications 4/2016

18.06.2016

An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks

verfasst von: Mohammad Wazid, Ashok Kumar Das

Erschienen in: Wireless Personal Communications | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensor nodes in a wireless sensor network (WSN) may be lost due to enervation or malicious attacks by an adversary. WSNs deployed for several applications including military applications are prone to various attacks, which degrade the network performance very rapidly. Hybrid anomaly is a type of anomaly that contains the different types of attacker nodes such as blackhole, misdirection, wormhole etc. These multiple attacks can be launched in the network using the hybrid anomaly. In this situation, it is very difficult to find out which kind of attacker nodes are activated in the network. This motivates us to design a robust and efficient secure intrusion detection approach in order to extend the lifetime of a WSN. In this paper, we aim to propose a new intrusion detection technique for hybrid anomaly, which uses the existing data mining algorithm, called K-means clustering. For the detection purpose, patterns of intrusions are built automatically by the K-means clustering algorithm over training data. After that intrusions are detected by matching network activities against these detection patterns. We evaluate our approach over a WSN dataset that is created using Opnet modeler, which contains various attributes, such as end-to-end delay, traffic sent and traffic received. The training dataset contains the normal values of the network parameters. The testing dataset is created in actual working mode consists of normal and abnormal values of the network parameters. The proposed technique has the ability to detect two types of malicious nodes: blackhole and misdirection nodes. Our scheme achieves 98.6 % detection rate and 1.2 % false positive rate, which are significantly better than the existing related schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef
2.
Zurück zum Zitat Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.CrossRef Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.CrossRef
3.
Zurück zum Zitat Dong, D., Li, M., Liu, Y., Li, X., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transaction on Networking, 19(6), 1787–1796.CrossRef Dong, D., Li, M., Liu, Y., Li, X., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transaction on Networking, 19(6), 1787–1796.CrossRef
4.
Zurück zum Zitat Shafieia, H., Khonsaria, A., Derakhshia, H., & Mousavia, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Computer and System Sciences, 80(3), 644–653.CrossRef Shafieia, H., Khonsaria, A., Derakhshia, H., & Mousavia, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Computer and System Sciences, 80(3), 644–653.CrossRef
5.
Zurück zum Zitat Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Electrical and Computer Engineering, 1–8. Article ID 240217. doi:10.1155/2014/240217. Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Electrical and Computer Engineering, 1–8. Article ID 240217. doi:10.​1155/​2014/​240217.
6.
Zurück zum Zitat Elbasiony, R. M., Sallam, E. A., Eltobely, T. E., & Fahmy, M. M. (2013). A hybrid network intrusion detection framework based on random forests and weighted K-means. Ain Shams Engineering, 4(4), 753–762.CrossRef Elbasiony, R. M., Sallam, E. A., Eltobely, T. E., & Fahmy, M. M. (2013). A hybrid network intrusion detection framework based on random forests and weighted K-means. Ain Shams Engineering, 4(4), 753–762.CrossRef
7.
Zurück zum Zitat Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). Intrusion detection based on k-means clustering and naive Bayes classification. In 7th IEEE International Conference on Information Technology in Asia (CITA) (pp. 1–6). Sarawak, Malaysia. Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). Intrusion detection based on k-means clustering and naive Bayes classification. In 7th IEEE International Conference on Information Technology in Asia (CITA) (pp. 1–6). Sarawak, Malaysia.
8.
Zurück zum Zitat Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH
9.
Zurück zum Zitat Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef
10.
Zurück zum Zitat Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.CrossRef Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.CrossRef
11.
Zurück zum Zitat Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., & Guan, Y. (2013). Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems, 24(1), 104–117.CrossRef Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., & Guan, Y. (2013). Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed Systems, 24(1), 104–117.CrossRef
12.
Zurück zum Zitat Zhang, J., Chen, C., Xiang, Y., Zhou, W., & Xiang, Y. (2013). Internet traffic classification by aggregating correlated naive Bayes predictions. IEEE Transactions on Information Forensics and Security, 8(1), 5–15.CrossRef Zhang, J., Chen, C., Xiang, Y., Zhou, W., & Xiang, Y. (2013). Internet traffic classification by aggregating correlated naive Bayes predictions. IEEE Transactions on Information Forensics and Security, 8(1), 5–15.CrossRef
13.
Zurück zum Zitat Xie, M., Hu, J., Han, S., & Chen, H. (2013). Scalable hyper grid k-NN-based online anomaly detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1661–1670.CrossRef Xie, M., Hu, J., Han, S., & Chen, H. (2013). Scalable hyper grid k-NN-based online anomaly detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1661–1670.CrossRef
14.
Zurück zum Zitat Shin, S., Kwon, T., Jo, G., Park, Y., & Rhy, H. (2010). An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics, 6(4), 744–757.CrossRef Shin, S., Kwon, T., Jo, G., Park, Y., & Rhy, H. (2010). An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics, 6(4), 744–757.CrossRef
15.
Zurück zum Zitat Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics, 38(5), 649–659.CrossRef Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics, 38(5), 649–659.CrossRef
16.
Zurück zum Zitat Hwang, K., Cai, M., Chen, Y., & Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing, 4(1), 41–55.CrossRef Hwang, K., Cai, M., Chen, Y., & Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing, 4(1), 41–55.CrossRef
17.
Zurück zum Zitat Sachan, R. S., Wazid, M., Singh, D. P., Katal, A., & Goudar, R. H. (2013). Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction. In 7th IEEE International Conference on Intelligent Systems and Control (ISCO) (pp. 427–432). Coimbatore, India. Sachan, R. S., Wazid, M., Singh, D. P., Katal, A., & Goudar, R. H. (2013). Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction. In 7th IEEE International Conference on Intelligent Systems and Control (ISCO) (pp. 427–432). Coimbatore, India.
18.
Zurück zum Zitat Wazid, M., Katal, A., Sachan, R. S., Goudar, R. H., & Singh, D. P. (2013). Detection and prevention mechanism for blackhole attack in wireless sensor network. In IEEE International Conference on Communication and Signal Processing (ICCSP) (pp. 576–581). Melmaruvathur, India. Wazid, M., Katal, A., Sachan, R. S., Goudar, R. H., & Singh, D. P. (2013). Detection and prevention mechanism for blackhole attack in wireless sensor network. In IEEE International Conference on Communication and Signal Processing (ICCSP) (pp. 576–581). Melmaruvathur, India.
19.
Zurück zum Zitat Qazanfari, K., Mirpouryan, M. S., & Gharaee, H. (2012). Novel hybrid anomaly based intrusion detection method. In 6th IEEE International Symposium on Telecommunications (IST) (pp. 942–947). Tehran, Iran. Qazanfari, K., Mirpouryan, M. S., & Gharaee, H. (2012). Novel hybrid anomaly based intrusion detection method. In 6th IEEE International Symposium on Telecommunications (IST) (pp. 942–947). Tehran, Iran.
20.
Zurück zum Zitat Chitrakar, R., & Chuanhe, H. (2012). Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and naive Bayes classification. In 8th IEEE International Conference on Wireless Communications (pp. 1–5). Networking and Mobile Computing (WiCOM) China: Shanghai. Chitrakar, R., & Chuanhe, H. (2012). Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and naive Bayes classification. In 8th IEEE International Conference on Wireless Communications (pp. 1–5). Networking and Mobile Computing (WiCOM) China: Shanghai.
21.
Zurück zum Zitat Aneetha, A. S., Indhu, T. S., & Bose, S. (2012). Hybrid network intrusion detection system using expert rule based approach. In 2nd ACM International Conference on Computational Science (pp. 47–51). Coimbatore: Engineering and Information Technology (CCSEIT) India. Aneetha, A. S., Indhu, T. S., & Bose, S. (2012). Hybrid network intrusion detection system using expert rule based approach. In 2nd ACM International Conference on Computational Science (pp. 47–51). Coimbatore: Engineering and Information Technology (CCSEIT) India.
22.
Zurück zum Zitat Agarwal, B., & Mittal, N. (2012). Hybrid approach for detection of anomaly network traffic using data mining techniques. In 2nd International Conference on Communication (pp. 996–1003). Rourkela: Computing and Security (ICCCS) India. Agarwal, B., & Mittal, N. (2012). Hybrid approach for detection of anomaly network traffic using data mining techniques. In 2nd International Conference on Communication (pp. 996–1003). Rourkela: Computing and Security (ICCCS) India.
23.
Zurück zum Zitat Arya, K. V., & Kumar, H. (2012). A clustering based algorithm for network intrusion detection. In 5th International Conference on Security of Information and Networks (pp. 193–196). Jaipur, India. Arya, K. V., & Kumar, H. (2012). A clustering based algorithm for network intrusion detection. In 5th International Conference on Security of Information and Networks (pp. 193–196). Jaipur, India.
24.
Zurück zum Zitat Chakraborty, S., & Nagwani, N. K. (2011). Analysis and study of incremental K-means clustering algorithm. In International Conference on High Performance Architecture and Grid Computing (HPAGC) (pp. 338–341). Chandigarh, India. Chakraborty, S., & Nagwani, N. K. (2011). Analysis and study of incremental K-means clustering algorithm. In International Conference on High Performance Architecture and Grid Computing (HPAGC) (pp. 338–341). Chandigarh, India.
25.
Zurück zum Zitat Misra, S., Bhattarai, K., & Xue, G. (2011). BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In IEEE International Conference on Communications (ICC) (pp. 1–5). Kyoto, Japan. Misra, S., Bhattarai, K., & Xue, G. (2011). BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In IEEE International Conference on Communications (ICC) (pp. 1–5). Kyoto, Japan.
26.
Zurück zum Zitat Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef
27.
Zurück zum Zitat Das, A. K. (2009). An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In First IEEE International on Communication Systems and Networks and Workshops (COMSNETS 2009) (pp. 1–10). Bangalore, India. Das, A. K. (2009). An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In First IEEE International on Communication Systems and Networks and Workshops (COMSNETS 2009) (pp. 1–10). Bangalore, India.
28.
Zurück zum Zitat Das, A. K. (2011). An efficient random key distribution scheme for large-scale distributed sensor networks. Security and Communication Networks, 4(2), 162–180.CrossRef Das, A. K. (2011). An efficient random key distribution scheme for large-scale distributed sensor networks. Security and Communication Networks, 4(2), 162–180.CrossRef
30.
Zurück zum Zitat Wang, J., Dong, W., Cao, Z., & Liu, Y. (2015). On the delay performance in a large-scale wireless sensor network: Measurement, analysis, and implications. IEEE/ACM Transactions on Networking, 23(1), 186–197.CrossRef Wang, J., Dong, W., Cao, Z., & Liu, Y. (2015). On the delay performance in a large-scale wireless sensor network: Measurement, analysis, and implications. IEEE/ACM Transactions on Networking, 23(1), 186–197.CrossRef
31.
Zurück zum Zitat Das, A. K. (2012). A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. International Journal of Information Security, 11(3), 189–211.CrossRef Das, A. K. (2012). A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. International Journal of Information Security, 11(3), 189–211.CrossRef
32.
Zurück zum Zitat Zhu, B., Setia, S., Jajodia, S., Roy, S., & Wang, L. (2010). Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Transactions on Mobile Computing, 9(7), 913–926.CrossRef Zhu, B., Setia, S., Jajodia, S., Roy, S., & Wang, L. (2010). Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Transactions on Mobile Computing, 9(7), 913–926.CrossRef
33.
Zurück zum Zitat Bandyopadhyay, S., & Maulik, U. (2002). An evolutionary technique based on K-means algorithm for optimal clustering in \(R^N\). Information Sciences, 146(1–4), 221–237.MathSciNetCrossRefMATH Bandyopadhyay, S., & Maulik, U. (2002). An evolutionary technique based on K-means algorithm for optimal clustering in \(R^N\). Information Sciences, 146(1–4), 221–237.MathSciNetCrossRefMATH
35.
Zurück zum Zitat Hubballi, N., Biswas, S., & Nandi, S. (2011). Network specific false alarm reduction in intrusion detection system. Security and Communication Networks, 4(11), 1339–1349.CrossRef Hubballi, N., Biswas, S., & Nandi, S. (2011). Network specific false alarm reduction in intrusion detection system. Security and Communication Networks, 4(11), 1339–1349.CrossRef
36.
Zurück zum Zitat Hubballi, N., Biswas, S., & Nandi, S. (2013). Towards reducing false alarms in network intrusion detection systems with data summarization technique. Security and Communication Networks, 6(3), 275–285.CrossRef Hubballi, N., Biswas, S., & Nandi, S. (2013). Towards reducing false alarms in network intrusion detection systems with data summarization technique. Security and Communication Networks, 6(3), 275–285.CrossRef
37.
Zurück zum Zitat Kasliwal, B., Bhatia, S., Saini, S., Thaseen, I. S., & Kumar, C. A. (2014). A hybrid anomaly detection model using G-LDA. In IEEE International Advance Computing Conference (IACC) (pp. 288–293). Gurgaon, India. Kasliwal, B., Bhatia, S., Saini, S., Thaseen, I. S., & Kumar, C. A. (2014). A hybrid anomaly detection model using G-LDA. In IEEE International Advance Computing Conference (IACC) (pp. 288–293). Gurgaon, India.
Metadaten
Titel
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
verfasst von
Mohammad Wazid
Ashok Kumar Das
Publikationsdatum
18.06.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3433-3

Weitere Artikel der Ausgabe 4/2016

Wireless Personal Communications 4/2016 Zur Ausgabe

Neuer Inhalt