Skip to main content
Erschienen in: Optical Memory and Neural Networks 3/2020

01.07.2020

Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network

verfasst von: Ashwini B. Abhale, S. S. Manivannan

Erschienen in: Optical Memory and Neural Networks | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

From the last decade, the use of internet and its growth is continuously increasing. Similarly, numbers of services are coming out along with the internet and it is being used for providing facilities to human beings. Wireless sensor have been used for various application such as fire safety, military application, petroleum industry, security system, monitoring and environmental condition and many more. WSN node exposes itself to various security related attacks due to low battery power supply, low bandwidth support, data transmission over multi hop node, dependency on intermediate or other nodes, distributed in nature and self-organization. The WSN attacks observe in all layers of OSI model. Wireless sensor nodes has various issues because of that, it experiences number problem related to its functionalities and some malfunction due to attacks. It is require to build defence and network monitoring system for identifying attacks and prevent them. Intrusion detection system (IDS) plays an important role to detect threads inside the system and generate the alert related to the attack. In this work, supervised classification models for intrusion detection are built using such as Random Forest classifier, Support Vector Machine, Decision Tree Classifier, LGBM Classifier, Extra Tree Classifier, Gradient Boosting Classifier, Ada Boost Classifier, K Nearest Neighbour Classifier, MLP Classifier, Gaussian Naive Bayes Classifier and Logistic Regression Classifier. The NSLKDD, i.e. Modified version of the KDD99 Data Set on which we checks these algorithms. Experimental results how the highest accuracy relative to other classification systems in the support vector machine.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Carlos-Mancilla, M., López-Mellado, E., and Siller, M., Wireless sensor networks formation: approaches and techniques, J. Sens., 2016, vol. 2016, art. ID 2081902.CrossRef Carlos-Mancilla, M., López-Mellado, E., and Siller, M., Wireless sensor networks formation: approaches and techniques, J. Sens., 2016, vol. 2016, art. ID 2081902.CrossRef
2.
Zurück zum Zitat Ali, A., Ming, Y., Chakraborty, S., and Iram, S., A comprehensive survey on real-time applications of WSN, Future Internet, 2017, vol. 9, no. 4. Ali, A., Ming, Y., Chakraborty, S., and Iram, S., A comprehensive survey on real-time applications of WSN, Future Internet, 2017, vol. 9, no. 4.
3.
Zurück zum Zitat Hussein, S.M., Performance evaluation of intrusion detection system using anomaly and signature based algorithms to reduction false alarm rate and detect unknown, Proc. 2016 Int. Conf. on Computational Science and Computational Intelligence (CSCI), Piscataway, NJ: Inst. Electr. Electron. Eng., 2016, pp. 1064–1069. Hussein, S.M., Performance evaluation of intrusion detection system using anomaly and signature based algorithms to reduction false alarm rate and detect unknown, Proc. 2016 Int. Conf. on Computational Science and Computational Intelligence (CSCI), Piscataway, NJ: Inst. Electr. Electron. Eng., 2016, pp. 1064–1069.
4.
Zurück zum Zitat Belavagi, M.C. and Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 2016, vol. 89, pp. 117–123.CrossRef Belavagi, M.C. and Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 2016, vol. 89, pp. 117–123.CrossRef
5.
Zurück zum Zitat Xu, C., Shen, J., Du, X., and Zhang, F., An intrusion detection system using a deep neural network with gated recurrent units, IEEE Access, 2018, vol. 6, pp. 48697–48707.CrossRef Xu, C., Shen, J., Du, X., and Zhang, F., An intrusion detection system using a deep neural network with gated recurrent units, IEEE Access, 2018, vol. 6, pp. 48697–48707.CrossRef
6.
Zurück zum Zitat Li, W., Yi, P., Wu, Y., Pan, L., and Li, J., A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electr. Comput. Eng., 2014, vol. 2014, no. 1, art. ID 240217. Li, W., Yi, P., Wu, Y., Pan, L., and Li, J., A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electr. Comput. Eng., 2014, vol. 2014, no. 1, art. ID 240217.
7.
Zurück zum Zitat Vinayakumar, R., Alazab, M, Soman, K.P., Poornachandran, P., Al-Nemrat, A., and Venkatraman, S., Deep learning approach for intelligent intrusion detection system, IEEE Access, 2019, vol. 7, pp. 41525–41550.CrossRef Vinayakumar, R., Alazab, M, Soman, K.P., Poornachandran, P., Al-Nemrat, A., and Venkatraman, S., Deep learning approach for intelligent intrusion detection system, IEEE Access, 2019, vol. 7, pp. 41525–41550.CrossRef
8.
Zurück zum Zitat Soliman, N., Hikal, A., and Sakr, N.A., A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egypt. Inf. J., 2012, vol. 13, no. 3, pp. 225–238. Soliman, N., Hikal, A., and Sakr, N.A., A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egypt. Inf. J., 2012, vol. 13, no. 3, pp. 225–238.
9.
Zurück zum Zitat El Mourabit, Y., Bouirden, A., Toumanari, A., and Moussaid, N.E., Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection, Int. J. Adv. Comput. Sci. Appl., 2014, vol. 6, no. 9, pp. 164–172. El Mourabit, Y., Bouirden, A., Toumanari, A., and Moussaid, N.E., Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection, Int. J. Adv. Comput. Sci. Appl., 2014, vol. 6, no. 9, pp. 164–172.
10.
Zurück zum Zitat Nadiammai, G.V. and Hemalatha, M., Effective approach toward Intrusion Detection System using data mining techniques, Egypt. Inf. J., 2014, vol. 15, no. 1, pp 37–50. Nadiammai, G.V. and Hemalatha, M., Effective approach toward Intrusion Detection System using data mining techniques, Egypt. Inf. J., 2014, vol. 15, no. 1, pp 37–50.
11.
Zurück zum Zitat Panda, M., Abraham, A., and Patra, M.R., A hybrid intelligent approach for network intrusion detection, Procedia Eng., 2012, vol. 30, no. 2011, pp. 1–9. Panda, M., Abraham, A., and Patra, M.R., A hybrid intelligent approach for network intrusion detection, Procedia Eng., 2012, vol. 30, no. 2011, pp. 1–9.
12.
Zurück zum Zitat Wattanapongsakorn, S.N. and Charnsripinyo, C., Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 2011, vol. 34, no. 8, pp. 2227–2235.CrossRef Wattanapongsakorn, S.N. and Charnsripinyo, C., Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 2011, vol. 34, no. 8, pp. 2227–2235.CrossRef
13.
Zurück zum Zitat Koc, L. and Carswell, A.D., Network intrusion detection using a hidden Naïve Bayes binary classifier, Int. J. Simul.: Syst., Sci. Technol., 2015, vol. 16, no. 3, pp. 3.1-3.6. Koc, L. and Carswell, A.D., Network intrusion detection using a hidden Naïve Bayes binary classifier, Int. J. Simul.: Syst., Sci. Technol., 2015, vol. 16, no. 3, pp. 3.1-3.6.
14.
Zurück zum Zitat Li, Y., Zhang, X.J., Yan, J., Ai, X., and Dai, K., An efficient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 424–430.CrossRef Li, Y., Zhang, X.J., Yan, J., Ai, X., and Dai, K., An efficient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 424–430.CrossRef
15.
Zurück zum Zitat Shin, S., Kwon, G., Jo, G.-Y., Park, Y., and Rhy, H., An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans. Ind. Inf., 2010, vol. 6, pp. 744–757.CrossRef Shin, S., Kwon, G., Jo, G.-Y., Park, Y., and Rhy, H., An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans. Ind. Inf., 2010, vol. 6, pp. 744–757.CrossRef
16.
Zurück zum Zitat Sindhu, S., Geetha, S., and Kannan, A., Decision tree based light weight intrusion detection using a wrapper approach, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 129–141.CrossRef Sindhu, S., Geetha, S., and Kannan, A., Decision tree based light weight intrusion detection using a wrapper approach, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 129–141.CrossRef
17.
Zurück zum Zitat Farooqi, A.H.F., Khan, A., Wang, J., and Lee, S., A novel intrusion detection framework for wireless sensor networks, Pers. Ubiquitous Comput., 2013, vol. 17, no. 5, pp. 907–919.CrossRef Farooqi, A.H.F., Khan, A., Wang, J., and Lee, S., A novel intrusion detection framework for wireless sensor networks, Pers. Ubiquitous Comput., 2013, vol. 17, no. 5, pp. 907–919.CrossRef
18.
Zurück zum Zitat Yin, C., Zhu, Y., Fei, J., and He, X., A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 2017, vol. 5, pp. 21954–21961.CrossRef Yin, C., Zhu, Y., Fei, J., and He, X., A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 2017, vol. 5, pp. 21954–21961.CrossRef
19.
Zurück zum Zitat Mandot, P., What is LightGBM, How to implement it? How to fine tune the parameters? 2017. https://medium.com/pushkarmandot/https-medium-com-pushkarmandot-what-is-lightgbm-how-to-implement-it-how-to-fine-tune-the-parameters-60347819b7fc. Accessed May 31, 2019. Mandot, P., What is LightGBM, How to implement it? How to fine tune the parameters? 2017. https://​medium.​com/​pushkarmandot/​https-medium-com-pushkarmandot-what-is-lightgbm-how-to-implement-it-how-to-fine-tune-the-parameters-60347819b7fc.​ Accessed May 31, 2019.
20.
Zurück zum Zitat Brownlee, J., Ensemble machine learning algorithms in Python with scikit-learn, Python Machine Learning, 2016. https://machinelearningmastery.com/ensemble-machine-learning-algorithms-python-scikit-learn/. Accessed May 31, 2019. Brownlee, J., Ensemble machine learning algorithms in Python with scikit-learn, Python Machine Learning, 2016. https://​machinelearningm​astery.​com/​ensemble-machine-learning-algorithms-python-scikit-learn/​.​ Accessed May 31, 2019.
21.
Zurück zum Zitat Biau, G. and Cadre, B., Optimization by gradient boosting, 2017. arXiv:1707.05023. Biau, G. and Cadre, B., Optimization by gradient boosting, 2017. arXiv:1707.05023.
23.
Zurück zum Zitat Kumar, D.P., Amgoth, T., and Annavarapu, C.S.R., Machine learning algorithms for wireless sensor networks: a survey, Inf. Fusion, 2019, vol. 49, pp. 1–25.CrossRef Kumar, D.P., Amgoth, T., and Annavarapu, C.S.R., Machine learning algorithms for wireless sensor networks: a survey, Inf. Fusion, 2019, vol. 49, pp. 1–25.CrossRef
24.
Zurück zum Zitat Mitchell, R. and Chen, I.R., A survey of intrusion detection in wireless network applications, Comput. Commun., 2014, vol. 42, pp.1–23.CrossRef Mitchell, R. and Chen, I.R., A survey of intrusion detection in wireless network applications, Comput. Commun., 2014, vol. 42, pp.1–23.CrossRef
25.
Zurück zum Zitat Wan, S., Liang, Y., Zhang, Y., and Guizani, M., Deep multi-layer perceptron classifier for behavior analysis to estimate Parkinson’s disease severity using smartphones, IEEE Access, 2018, vol. 6, pp. 36825–36833.CrossRef Wan, S., Liang, Y., Zhang, Y., and Guizani, M., Deep multi-layer perceptron classifier for behavior analysis to estimate Parkinson’s disease severity using smartphones, IEEE Access, 2018, vol. 6, pp. 36825–36833.CrossRef
26.
Zurück zum Zitat Almomani, I., Al-Kasasbeh, B., and AL-Akhras, M., Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016, vol. 2016, art. ID 4731953.CrossRef Almomani, I., Al-Kasasbeh, B., and AL-Akhras, M., Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016, vol. 2016, art. ID 4731953.CrossRef
27.
Zurück zum Zitat Boutaba, R., et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, J. Internet Serv. Appl., 2018, vol. 9, no. 16, p. 99.CrossRef Boutaba, R., et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, J. Internet Serv. Appl., 2018, vol. 9, no. 16, p. 99.CrossRef
28.
Zurück zum Zitat Mahdavifar, S. and Ghorbani, A.A., Application of deep learning to cybersecurity: a survey, Neurocomputing, 2019, vol. 347, pp. 149–176.CrossRef Mahdavifar, S. and Ghorbani, A.A., Application of deep learning to cybersecurity: a survey, Neurocomputing, 2019, vol. 347, pp. 149–176.CrossRef
29.
Zurück zum Zitat KDD Cup 1999 data, UCI KDD archive, University of California, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed May 31, 2019. KDD Cup 1999 data, UCI KDD archive, University of California, 1999. http://​kdd.​ics.​uci.​edu/​databases/​kddcup99/​kddcup99.​html.​ Accessed May 31, 2019.
30.
Zurück zum Zitat NSL-KDD dataset, University of New Brunswick. https://www.unb.ca/cic/datasets/nsl.html. Accessed May 31, 2019. NSL-KDD dataset, University of New Brunswick. https://​www.​unb.​ca/​cic/​datasets/​nsl.​html.​ Accessed May 31, 2019.
Metadaten
Titel
Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network
verfasst von
Ashwini B. Abhale
S. S. Manivannan
Publikationsdatum
01.07.2020
Verlag
Pleiades Publishing
Erschienen in
Optical Memory and Neural Networks / Ausgabe 3/2020
Print ISSN: 1060-992X
Elektronische ISSN: 1934-7898
DOI
https://doi.org/10.3103/S1060992X20030029

Weitere Artikel der Ausgabe 3/2020

Optical Memory and Neural Networks 3/2020 Zur Ausgabe

Premium Partner