Skip to main content

2023 | OriginalPaper | Buchkapitel

Detection of Mirai and GAF-GYT Attack in Wireless Sensor Network

verfasst von : Hanjabam Saratchandra Sharma, Moirangthem Marjit Singh, Arindam Sarkar

Erschienen in: Intelligent Cyber Physical Systems and Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Network plays an important role in collecting data from different environments where human involvement is deemed fatal or unnecessary. Apart from its usefulness, security threats and vulnerabilities exist as a common problem. A robust IDS (intrusion detection system) in WSN will be helpful in detecting and classifying the types of attacks, so as to remove or nullify the security threats. In this paper, we proposed a method to detect Mirai and GAF-GYT attacks in WSN using CNN along with f_classif function and normalization. Further, implementation of the proposed method has been carried out considering the scenarios: CNN without normalization along with f_classif function and CNN without normalization and without f_classif function. It is seen that the method that uses CNN along with f_classif function and normalization exhibits better performance in terms of parameters such as TPR, PPV, TNR, NPV, FPR, FDR, and FNR.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
4.
Zurück zum Zitat Hu X, Sun R, Xu K, Zhang Y, Chang P (2020) Exploit ınternal structural ınformation for IoT malware detection based on hierarchical transformer model. In: 2020 IEEE 19th ınternational conference on trust, security and privacy in computing and communications (TrustCom), 2020, pp 927–934. https://doi.org/10.1109/TrustCom50675.2020.00124 Hu X, Sun R, Xu K, Zhang Y, Chang P (2020) Exploit ınternal structural ınformation for IoT malware detection based on hierarchical transformer model. In: 2020 IEEE 19th ınternational conference on trust, security and privacy in computing and communications (TrustCom), 2020, pp 927–934. https://​doi.​org/​10.​1109/​TrustCom50675.​2020.​00124
7.
Zurück zum Zitat Baig ZA, Sanguanpong S, Naeem Firdous S, Nhan Vo V, So-In C (2020) Averaged dependence estimators for DoS attack detection in IoT networks. Futur Gener Comput Syst 102:198–209CrossRef Baig ZA, Sanguanpong S, Naeem Firdous S, Nhan Vo V, So-In C (2020) Averaged dependence estimators for DoS attack detection in IoT networks. Futur Gener Comput Syst 102:198–209CrossRef
9.
Zurück zum Zitat Umamaheshwari S, Kumar SA, Sasikala S (2021) Towards building robust ıntrusion detection system in wireless sensor networks using machine learning and feature selection. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA), pp 1–6. https://doi.org/10.1109/ICAECA52838.2021.9675609 Umamaheshwari S, Kumar SA, Sasikala S (2021) Towards building robust ıntrusion detection system in wireless sensor networks using machine learning and feature selection. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA), pp 1–6. https://​doi.​org/​10.​1109/​ICAECA52838.​2021.​9675609
10.
Zurück zum Zitat Nguyen H-T, Ngo Q-D, Nguyen D-H, Le V-H (2020) PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express (in press, corrected proof, Available online 7) Nguyen H-T, Ngo Q-D, Nguyen D-H, Le V-H (2020) PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express (in press, corrected proof, Available online 7)
11.
Zurück zum Zitat Jung W, Zhao H, Sun M, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health 15:100103CrossRef Jung W, Zhao H, Sun M, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health 15:100103CrossRef
12.
Zurück zum Zitat Shailendra Rathore J, Park H (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89CrossRef Shailendra Rathore J, Park H (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89CrossRef
13.
Zurück zum Zitat Singh MM, Dutta N, Singh TR, Nandi U (2020) A technique to detect wormhole attack in wireless sensor network using artificial neural network. In: Suma V et al (eds) Evolutionary computing and mobile sustainable networks. Lecture notes on data engineering and communications technologies, vol 53. Springer, Singapore, pp 297–307. https://doi.org/10.1007/978-981-15-5258-8_29 Singh MM, Dutta N, Singh TR, Nandi U (2020) A technique to detect wormhole attack in wireless sensor network using artificial neural network. In: Suma V et al (eds) Evolutionary computing and mobile sustainable networks. Lecture notes on data engineering and communications technologies, vol 53. Springer, Singapore, pp 297–307. https://​doi.​org/​10.​1007/​978-981-15-5258-8_​29
Metadaten
Titel
Detection of Mirai and GAF-GYT Attack in Wireless Sensor Network
verfasst von
Hanjabam Saratchandra Sharma
Moirangthem Marjit Singh
Arindam Sarkar
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_44

Premium Partner