Skip to main content
Top

2023 | OriginalPaper | Chapter

Detection of Mirai and GAF-GYT Attack in Wireless Sensor Network

Authors : Hanjabam Saratchandra Sharma, Moirangthem Marjit Singh, Arindam Sarkar

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless Sensor Network plays an important role in collecting data from different environments where human involvement is deemed fatal or unnecessary. Apart from its usefulness, security threats and vulnerabilities exist as a common problem. A robust IDS (intrusion detection system) in WSN will be helpful in detecting and classifying the types of attacks, so as to remove or nullify the security threats. In this paper, we proposed a method to detect Mirai and GAF-GYT attacks in WSN using CNN along with f_classif function and normalization. Further, implementation of the proposed method has been carried out considering the scenarios: CNN without normalization along with f_classif function and CNN without normalization and without f_classif function. It is seen that the method that uses CNN along with f_classif function and normalization exhibits better performance in terms of parameters such as TPR, PPV, TNR, NPV, FPR, FDR, and FNR.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
4.
go back to reference Hu X, Sun R, Xu K, Zhang Y, Chang P (2020) Exploit ınternal structural ınformation for IoT malware detection based on hierarchical transformer model. In: 2020 IEEE 19th ınternational conference on trust, security and privacy in computing and communications (TrustCom), 2020, pp 927–934. https://doi.org/10.1109/TrustCom50675.2020.00124 Hu X, Sun R, Xu K, Zhang Y, Chang P (2020) Exploit ınternal structural ınformation for IoT malware detection based on hierarchical transformer model. In: 2020 IEEE 19th ınternational conference on trust, security and privacy in computing and communications (TrustCom), 2020, pp 927–934. https://​doi.​org/​10.​1109/​TrustCom50675.​2020.​00124
7.
go back to reference Baig ZA, Sanguanpong S, Naeem Firdous S, Nhan Vo V, So-In C (2020) Averaged dependence estimators for DoS attack detection in IoT networks. Futur Gener Comput Syst 102:198–209CrossRef Baig ZA, Sanguanpong S, Naeem Firdous S, Nhan Vo V, So-In C (2020) Averaged dependence estimators for DoS attack detection in IoT networks. Futur Gener Comput Syst 102:198–209CrossRef
9.
go back to reference Umamaheshwari S, Kumar SA, Sasikala S (2021) Towards building robust ıntrusion detection system in wireless sensor networks using machine learning and feature selection. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA), pp 1–6. https://doi.org/10.1109/ICAECA52838.2021.9675609 Umamaheshwari S, Kumar SA, Sasikala S (2021) Towards building robust ıntrusion detection system in wireless sensor networks using machine learning and feature selection. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA), pp 1–6. https://​doi.​org/​10.​1109/​ICAECA52838.​2021.​9675609
10.
go back to reference Nguyen H-T, Ngo Q-D, Nguyen D-H, Le V-H (2020) PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express (in press, corrected proof, Available online 7) Nguyen H-T, Ngo Q-D, Nguyen D-H, Le V-H (2020) PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express (in press, corrected proof, Available online 7)
11.
go back to reference Jung W, Zhao H, Sun M, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health 15:100103CrossRef Jung W, Zhao H, Sun M, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health 15:100103CrossRef
12.
go back to reference Shailendra Rathore J, Park H (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89CrossRef Shailendra Rathore J, Park H (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89CrossRef
13.
go back to reference Singh MM, Dutta N, Singh TR, Nandi U (2020) A technique to detect wormhole attack in wireless sensor network using artificial neural network. In: Suma V et al (eds) Evolutionary computing and mobile sustainable networks. Lecture notes on data engineering and communications technologies, vol 53. Springer, Singapore, pp 297–307. https://doi.org/10.1007/978-981-15-5258-8_29 Singh MM, Dutta N, Singh TR, Nandi U (2020) A technique to detect wormhole attack in wireless sensor network using artificial neural network. In: Suma V et al (eds) Evolutionary computing and mobile sustainable networks. Lecture notes on data engineering and communications technologies, vol 53. Springer, Singapore, pp 297–307. https://​doi.​org/​10.​1007/​978-981-15-5258-8_​29
Metadata
Title
Detection of Mirai and GAF-GYT Attack in Wireless Sensor Network
Authors
Hanjabam Saratchandra Sharma
Moirangthem Marjit Singh
Arindam Sarkar
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_44

Premium Partner