Skip to main content

2017 | OriginalPaper | Buchkapitel

Attack Detection Using Evolutionary Computation

verfasst von : Martin Stehlik, Vashek Matyas, Andriy Stetsko

Erschienen in: Computational Intelligence in Wireless Sensor Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are often deployed in open and potentially hostile environments. An attacker can easily capture the sensor nodes or replace them with malicious devices that actively manipulate the communication. Several intrusion detection systems (IDSs) have been proposed to detect different kinds of active attacks by sensor nodes themselves. However, the optimization of the IDSs w.r.t. the accuracy and also sensor nodes’ resource consumption is often left unresolved. We use multi-objective evolutionary algorithms to optimize the IDS with respect to three objectives for each specific WSN application and environment. The optimization on two detection techniques aimed at a selective forwarding attack and a delay attack is evaluated. Moreover, we discuss various attacker strategies ranging from an attacker behavior to a deployment of the malicious sensor nodes in the WSN. The robustness of the IDS settings optimized for six different attacker strategies is evaluated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Pareto front is a set of non-dominated solutions with respect to all objectives. Thus, a network operator can easily choose between a solution A with a better IDS accuracy but higher resource consumption or solution B with a worse IDS accuracy but lower resource consumption. Solution C, that is dominated by A and B in all objectives is dominated and, thus, is not a member of the Pareto front.
 
2
As shown below, evolution can improve the results farther.
 
3
Such traffic can be overheard by less (if any) number of neighbors comparing to a sensor node placed closer to the BS receiving packets from several directions.
 
Literatur
1.
Zurück zum Zitat da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16–23 (2005) da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16–23 (2005)
2.
Zurück zum Zitat Stehlik, M., Matyas, V., Stetsko, A.: Towards better selective forwarding and delay attacks in wireless sensor networks. In: Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control (2016) Stehlik, M., Matyas, V., Stetsko, A.: Towards better selective forwarding and delay attacks in wireless sensor networks. In: Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control (2016)
3.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. AdHoc Netw. J. 1(2), 293–315 (2003)CrossRef Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. AdHoc Netw. J. 1(2), 293–315 (2003)CrossRef
4.
Zurück zum Zitat Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference (2007) Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference (2007)
5.
Zurück zum Zitat Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. ICCIT ’09, pp. 824–828. IEEE Computer Society, Washington, DC (2009) Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. ICCIT ’09, pp. 824–828. IEEE Computer Society, Washington, DC (2009)
6.
Zurück zum Zitat Hai, T.H., Huh, E.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Seventh IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008) Hai, T.H., Huh, E.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Seventh IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008)
7.
Zurück zum Zitat Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007) Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007)
8.
Zurück zum Zitat Khanna, R., Liu, H., Chen, H.H.: Self-organization of sensor networks using genetic algorithms. In: IEEE International Conference on Communications, 2006. ICC’06, vol. 8, pp. 3377–3382 (2006) Khanna, R., Liu, H., Chen, H.H.: Self-organization of sensor networks using genetic algorithms. In: IEEE International Conference on Communications, 2006. ICC’06, vol. 8, pp. 3377–3382 (2006)
9.
Zurück zum Zitat Khanna, R., Liu, H., Chen, H.H.: Dynamic optimization of secure mobile sensor networks: a genetic algorithm. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 3413–3418, (2007) Khanna, R., Liu, H., Chen, H.H.: Dynamic optimization of secure mobile sensor networks: a genetic algorithm. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 3413–3418, (2007)
10.
Zurück zum Zitat Khanna, R., Liu, H., Chen, H.H.: Reduced complexity intrusion detection in sensor networks using genetic algorithm. In: IEEE International Conference on Communications, 2009. ICC’09, pp. 1–5 (2009) Khanna, R., Liu, H., Chen, H.H.: Reduced complexity intrusion detection in sensor networks using genetic algorithm. In: IEEE International Conference on Communications, 2009. ICC’09, pp. 1–5 (2009)
11.
Zurück zum Zitat Heady, R., Lugar, G., Servilla, M., Maccabe, A.: The Architecture of a Network Level Intrusion Detection System. Technical report, University of New Mexico, Albuquerque, NM (1990) Heady, R., Lugar, G., Servilla, M., Maccabe, A.: The Architecture of a Network Level Intrusion Detection System. Technical report, University of New Mexico, Albuquerque, NM (1990)
12.
Zurück zum Zitat Stehlik, M., Saleh, A., Stetsko, A., Matyas, V.: Multi-objective optimization of intrusion detection systems for wireless sensor networks. In: Li, P., et al. (eds.) Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, pp. 569–576. MIT Press, Cambridge, MA (2013) Stehlik, M., Saleh, A., Stetsko, A., Matyas, V.: Multi-objective optimization of intrusion detection systems for wireless sensor networks. In: Li, P., et al. (eds.) Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, pp. 569–576. MIT Press, Cambridge, MA (2013)
13.
Zurück zum Zitat Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: Proceedings of 5th International Conference on Intelligent Systems Design and Applications, 2005. ISDA ’05, pp. 344–349. IEEE (2005) Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: Proceedings of 5th International Conference on Intelligent Systems Design and Applications, 2005. ISDA ’05, pp. 344–349. IEEE (2005)
14.
Zurück zum Zitat Banerjee, S., Grosan, C., Abraham, A., Mahanti, P.K.: Intrusion detection on sensor networks using emotional ants. Int. J. Appl. Sci. Comput. 12(3), 152–173 (2005) Banerjee, S., Grosan, C., Abraham, A., Mahanti, P.K.: Intrusion detection on sensor networks using emotional ants. Int. J. Appl. Sci. Comput. 12(3), 152–173 (2005)
15.
Zurück zum Zitat Mukherjee, P., Sen, S.: Using learned data patterns to detect malicious nodes in sensor networks. In: Proceedings of the 9th International Conference on Distributed Computing and Networking. ICDCN’08, pp. 339–344. Springer, Berlin (2008) Mukherjee, P., Sen, S.: Using learned data patterns to detect malicious nodes in sensor networks. In: Proceedings of the 9th International Conference on Distributed Computing and Networking. ICDCN’08, pp. 339–344. Springer, Berlin (2008)
16.
Zurück zum Zitat Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: The First IEEE International Conference on System Integration and Reliability Improvements, vol. 25, p. 94 (2006) Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: The First IEEE International Conference on System Integration and Reliability Improvements, vol. 25, p. 94 (2006)
17.
Zurück zum Zitat Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)CrossRef Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)CrossRef
18.
Zurück zum Zitat Stetsko, A., Smolka, T., Matyas, V., Stehlik, M.: Improving intrusion detection systems for wireless sensor networks. In: Boureanu, I., et al. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 8479, pp. 343–360. Springer, Berlin (2014) Stetsko, A., Smolka, T., Matyas, V., Stehlik, M.: Improving intrusion detection systems for wireless sensor networks. In: Boureanu, I., et al. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 8479, pp. 343–360. Springer, Berlin (2014)
19.
Zurück zum Zitat Matyas, V., Svenda, P., Stetsko, A., Klinec, D., Jurnecka, F., Stehlik, M.: Securing Cyber Physical Systems, chapter 5: WSNProtectLayer Security Middleware for Wireless Sensor Networks. CRC Press, Boca Raton, FL (2015). ISBN 978-1-4987-0098-6 Matyas, V., Svenda, P., Stetsko, A., Klinec, D., Jurnecka, F., Stehlik, M.: Securing Cyber Physical Systems, chapter 5: WSNProtectLayer Security Middleware for Wireless Sensor Networks. CRC Press, Boca Raton, FL (2015). ISBN 978-1-4987-0098-6
20.
Zurück zum Zitat Roman, R., Lopez, J., Gritzalis, S.: Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4), 102–107 (2008)CrossRef Roman, R., Lopez, J., Gritzalis, S.: Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4), 102–107 (2008)CrossRef
21.
Zurück zum Zitat Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of IEEE/ACM Workshop on Grid Computing, pp. 4–10 (2001) Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of IEEE/ACM Workshop on Grid Computing, pp. 4–10 (2001)
22.
Zurück zum Zitat Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Klein Haneveld, P.T., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating Wireless and Mobile Networks in OMNeT++ the MiXiM Vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp., 71–78, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels (2008) Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Klein Haneveld, P.T., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating Wireless and Mobile Networks in OMNeT++ the MiXiM Vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp., 71–78, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels (2008)
24.
Zurück zum Zitat Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 733–738. Los Alamitos (2011) Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 733–738. Los Alamitos (2011)
25.
Zurück zum Zitat Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs, NJ (2001)MATH Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs, NJ (2001)MATH
27.
Zurück zum Zitat Talbi, E.G.: Metaheuristics—From Design to Implementation. Wiley, New York (2009)MATH Talbi, E.G.: Metaheuristics—From Design to Implementation. Wiley, New York (2009)MATH
28.
Zurück zum Zitat Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)CrossRef Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)CrossRef
29.
Zurück zum Zitat Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the Strength Pareto Evolutionary Algorithm. Technical report, Eidgenössische Technische Hochschule Zürich (ETH) (2001) Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the Strength Pareto Evolutionary Algorithm. Technical report, Eidgenössische Technische Hochschule Zürich (ETH) (2001)
30.
Zurück zum Zitat Auger, A., Bader, J., Brockhoff, D., Zitzler, E.: Theory of the hypervolume indicator: optimal \(\mu \)-distributions and the choice of the reference point. In: Proceedings of the Tenth ACM SIGEVO Workshop on Foundations of Genetic Algorithms. FOGA ’09, pp. 87–102. ACM. New York, NY (2009) Auger, A., Bader, J., Brockhoff, D., Zitzler, E.: Theory of the hypervolume indicator: optimal \(\mu \)-distributions and the choice of the reference point. In: Proceedings of the Tenth ACM SIGEVO Workshop on Foundations of Genetic Algorithms. FOGA ’09, pp. 87–102. ACM. New York, NY (2009)
31.
Zurück zum Zitat Fonseca, C.M., Paquete, L., Lopez-Ibanez, M.:. An improved dimension-sweep algorithm for the hypervolume indicator. In: IEEE Congress on Evolutionary Computation, 2006. CEC 2006, pp. 1157–1163 (2006) Fonseca, C.M., Paquete, L., Lopez-Ibanez, M.:. An improved dimension-sweep algorithm for the hypervolume indicator. In: IEEE Congress on Evolutionary Computation, 2006. CEC 2006, pp. 1157–1163 (2006)
32.
Zurück zum Zitat Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257–271 (1999)CrossRef Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257–271 (1999)CrossRef
33.
Zurück zum Zitat Jurnecka, F., Stehlik, M., Matyas, V.:. On node capturing attacker strategies. In: Security Protocols XXII—22nd International Workshop Cambridge. Revised Selected Papers, pp. 300–315. Springer LNCS (2014) Jurnecka, F., Stehlik, M., Matyas, V.:. On node capturing attacker strategies. In: Security Protocols XXII—22nd International Workshop Cambridge. Revised Selected Papers, pp. 300–315. Springer LNCS (2014)
34.
Zurück zum Zitat Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In 20th International Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. IEEE (2006) Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In 20th International Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. IEEE (2006)
Metadaten
Titel
Attack Detection Using Evolutionary Computation
verfasst von
Martin Stehlik
Vashek Matyas
Andriy Stetsko
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-47715-2_5