Skip to main content
Top

2017 | OriginalPaper | Chapter

Attack Detection Using Evolutionary Computation

Authors : Martin Stehlik, Vashek Matyas, Andriy Stetsko

Published in: Computational Intelligence in Wireless Sensor Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are often deployed in open and potentially hostile environments. An attacker can easily capture the sensor nodes or replace them with malicious devices that actively manipulate the communication. Several intrusion detection systems (IDSs) have been proposed to detect different kinds of active attacks by sensor nodes themselves. However, the optimization of the IDSs w.r.t. the accuracy and also sensor nodes’ resource consumption is often left unresolved. We use multi-objective evolutionary algorithms to optimize the IDS with respect to three objectives for each specific WSN application and environment. The optimization on two detection techniques aimed at a selective forwarding attack and a delay attack is evaluated. Moreover, we discuss various attacker strategies ranging from an attacker behavior to a deployment of the malicious sensor nodes in the WSN. The robustness of the IDS settings optimized for six different attacker strategies is evaluated.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Pareto front is a set of non-dominated solutions with respect to all objectives. Thus, a network operator can easily choose between a solution A with a better IDS accuracy but higher resource consumption or solution B with a worse IDS accuracy but lower resource consumption. Solution C, that is dominated by A and B in all objectives is dominated and, thus, is not a member of the Pareto front.
 
2
As shown below, evolution can improve the results farther.
 
3
Such traffic can be overheard by less (if any) number of neighbors comparing to a sensor node placed closer to the BS receiving packets from several directions.
 
Literature
1.
go back to reference da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16–23 (2005) da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16–23 (2005)
2.
go back to reference Stehlik, M., Matyas, V., Stetsko, A.: Towards better selective forwarding and delay attacks in wireless sensor networks. In: Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control (2016) Stehlik, M., Matyas, V., Stetsko, A.: Towards better selective forwarding and delay attacks in wireless sensor networks. In: Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control (2016)
3.
go back to reference Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. AdHoc Netw. J. 1(2), 293–315 (2003)CrossRef Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. AdHoc Netw. J. 1(2), 293–315 (2003)CrossRef
4.
go back to reference Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference (2007) Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference (2007)
5.
go back to reference Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. ICCIT ’09, pp. 824–828. IEEE Computer Society, Washington, DC (2009) Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. ICCIT ’09, pp. 824–828. IEEE Computer Society, Washington, DC (2009)
6.
go back to reference Hai, T.H., Huh, E.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Seventh IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008) Hai, T.H., Huh, E.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Seventh IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008)
7.
go back to reference Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007) Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007)
8.
go back to reference Khanna, R., Liu, H., Chen, H.H.: Self-organization of sensor networks using genetic algorithms. In: IEEE International Conference on Communications, 2006. ICC’06, vol. 8, pp. 3377–3382 (2006) Khanna, R., Liu, H., Chen, H.H.: Self-organization of sensor networks using genetic algorithms. In: IEEE International Conference on Communications, 2006. ICC’06, vol. 8, pp. 3377–3382 (2006)
9.
go back to reference Khanna, R., Liu, H., Chen, H.H.: Dynamic optimization of secure mobile sensor networks: a genetic algorithm. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 3413–3418, (2007) Khanna, R., Liu, H., Chen, H.H.: Dynamic optimization of secure mobile sensor networks: a genetic algorithm. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 3413–3418, (2007)
10.
go back to reference Khanna, R., Liu, H., Chen, H.H.: Reduced complexity intrusion detection in sensor networks using genetic algorithm. In: IEEE International Conference on Communications, 2009. ICC’09, pp. 1–5 (2009) Khanna, R., Liu, H., Chen, H.H.: Reduced complexity intrusion detection in sensor networks using genetic algorithm. In: IEEE International Conference on Communications, 2009. ICC’09, pp. 1–5 (2009)
11.
go back to reference Heady, R., Lugar, G., Servilla, M., Maccabe, A.: The Architecture of a Network Level Intrusion Detection System. Technical report, University of New Mexico, Albuquerque, NM (1990) Heady, R., Lugar, G., Servilla, M., Maccabe, A.: The Architecture of a Network Level Intrusion Detection System. Technical report, University of New Mexico, Albuquerque, NM (1990)
12.
go back to reference Stehlik, M., Saleh, A., Stetsko, A., Matyas, V.: Multi-objective optimization of intrusion detection systems for wireless sensor networks. In: Li, P., et al. (eds.) Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, pp. 569–576. MIT Press, Cambridge, MA (2013) Stehlik, M., Saleh, A., Stetsko, A., Matyas, V.: Multi-objective optimization of intrusion detection systems for wireless sensor networks. In: Li, P., et al. (eds.) Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, pp. 569–576. MIT Press, Cambridge, MA (2013)
13.
go back to reference Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: Proceedings of 5th International Conference on Intelligent Systems Design and Applications, 2005. ISDA ’05, pp. 344–349. IEEE (2005) Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: Proceedings of 5th International Conference on Intelligent Systems Design and Applications, 2005. ISDA ’05, pp. 344–349. IEEE (2005)
14.
go back to reference Banerjee, S., Grosan, C., Abraham, A., Mahanti, P.K.: Intrusion detection on sensor networks using emotional ants. Int. J. Appl. Sci. Comput. 12(3), 152–173 (2005) Banerjee, S., Grosan, C., Abraham, A., Mahanti, P.K.: Intrusion detection on sensor networks using emotional ants. Int. J. Appl. Sci. Comput. 12(3), 152–173 (2005)
15.
go back to reference Mukherjee, P., Sen, S.: Using learned data patterns to detect malicious nodes in sensor networks. In: Proceedings of the 9th International Conference on Distributed Computing and Networking. ICDCN’08, pp. 339–344. Springer, Berlin (2008) Mukherjee, P., Sen, S.: Using learned data patterns to detect malicious nodes in sensor networks. In: Proceedings of the 9th International Conference on Distributed Computing and Networking. ICDCN’08, pp. 339–344. Springer, Berlin (2008)
16.
go back to reference Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: The First IEEE International Conference on System Integration and Reliability Improvements, vol. 25, p. 94 (2006) Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: The First IEEE International Conference on System Integration and Reliability Improvements, vol. 25, p. 94 (2006)
17.
go back to reference Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)CrossRef Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)CrossRef
18.
go back to reference Stetsko, A., Smolka, T., Matyas, V., Stehlik, M.: Improving intrusion detection systems for wireless sensor networks. In: Boureanu, I., et al. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 8479, pp. 343–360. Springer, Berlin (2014) Stetsko, A., Smolka, T., Matyas, V., Stehlik, M.: Improving intrusion detection systems for wireless sensor networks. In: Boureanu, I., et al. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 8479, pp. 343–360. Springer, Berlin (2014)
19.
go back to reference Matyas, V., Svenda, P., Stetsko, A., Klinec, D., Jurnecka, F., Stehlik, M.: Securing Cyber Physical Systems, chapter 5: WSNProtectLayer Security Middleware for Wireless Sensor Networks. CRC Press, Boca Raton, FL (2015). ISBN 978-1-4987-0098-6 Matyas, V., Svenda, P., Stetsko, A., Klinec, D., Jurnecka, F., Stehlik, M.: Securing Cyber Physical Systems, chapter 5: WSNProtectLayer Security Middleware for Wireless Sensor Networks. CRC Press, Boca Raton, FL (2015). ISBN 978-1-4987-0098-6
20.
go back to reference Roman, R., Lopez, J., Gritzalis, S.: Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4), 102–107 (2008)CrossRef Roman, R., Lopez, J., Gritzalis, S.: Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4), 102–107 (2008)CrossRef
21.
go back to reference Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of IEEE/ACM Workshop on Grid Computing, pp. 4–10 (2001) Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: Proceedings of IEEE/ACM Workshop on Grid Computing, pp. 4–10 (2001)
22.
go back to reference Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Klein Haneveld, P.T., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating Wireless and Mobile Networks in OMNeT++ the MiXiM Vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp., 71–78, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels (2008) Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Klein Haneveld, P.T., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating Wireless and Mobile Networks in OMNeT++ the MiXiM Vision. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp., 71–78, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels (2008)
24.
go back to reference Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 733–738. Los Alamitos (2011) Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 733–738. Los Alamitos (2011)
25.
go back to reference Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs, NJ (2001)MATH Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs, NJ (2001)MATH
27.
go back to reference Talbi, E.G.: Metaheuristics—From Design to Implementation. Wiley, New York (2009)MATH Talbi, E.G.: Metaheuristics—From Design to Implementation. Wiley, New York (2009)MATH
28.
go back to reference Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)CrossRef Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)CrossRef
29.
go back to reference Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the Strength Pareto Evolutionary Algorithm. Technical report, Eidgenössische Technische Hochschule Zürich (ETH) (2001) Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the Strength Pareto Evolutionary Algorithm. Technical report, Eidgenössische Technische Hochschule Zürich (ETH) (2001)
30.
go back to reference Auger, A., Bader, J., Brockhoff, D., Zitzler, E.: Theory of the hypervolume indicator: optimal \(\mu \)-distributions and the choice of the reference point. In: Proceedings of the Tenth ACM SIGEVO Workshop on Foundations of Genetic Algorithms. FOGA ’09, pp. 87–102. ACM. New York, NY (2009) Auger, A., Bader, J., Brockhoff, D., Zitzler, E.: Theory of the hypervolume indicator: optimal \(\mu \)-distributions and the choice of the reference point. In: Proceedings of the Tenth ACM SIGEVO Workshop on Foundations of Genetic Algorithms. FOGA ’09, pp. 87–102. ACM. New York, NY (2009)
31.
go back to reference Fonseca, C.M., Paquete, L., Lopez-Ibanez, M.:. An improved dimension-sweep algorithm for the hypervolume indicator. In: IEEE Congress on Evolutionary Computation, 2006. CEC 2006, pp. 1157–1163 (2006) Fonseca, C.M., Paquete, L., Lopez-Ibanez, M.:. An improved dimension-sweep algorithm for the hypervolume indicator. In: IEEE Congress on Evolutionary Computation, 2006. CEC 2006, pp. 1157–1163 (2006)
32.
go back to reference Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257–271 (1999)CrossRef Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257–271 (1999)CrossRef
33.
go back to reference Jurnecka, F., Stehlik, M., Matyas, V.:. On node capturing attacker strategies. In: Security Protocols XXII—22nd International Workshop Cambridge. Revised Selected Papers, pp. 300–315. Springer LNCS (2014) Jurnecka, F., Stehlik, M., Matyas, V.:. On node capturing attacker strategies. In: Security Protocols XXII—22nd International Workshop Cambridge. Revised Selected Papers, pp. 300–315. Springer LNCS (2014)
34.
go back to reference Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In 20th International Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. IEEE (2006) Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In 20th International Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. IEEE (2006)
Metadata
Title
Attack Detection Using Evolutionary Computation
Authors
Martin Stehlik
Vashek Matyas
Andriy Stetsko
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-47715-2_5

Premium Partner