An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks

Internet of Things - Tập 22 - Trang 100684 - 2023
Silvio E. Quincozes1, Juliano F. Kazienko2, Vagner E. Quincozes3
1Federal University of Uberlândia (UFU), Uberlândia, MG, Brazil
2Federal University of Santa Maria – UFSM, Santa Maria, RS, Brazil
3Federal University of Pampa (UNIPAMPA), Alegrete, RS, Brazil

Tài liệu tham khảo

Osanaiye, 2018, Denial of service defence for resource availability in wireless sensor networks, IEEE Access, 6, 6975, 10.1109/ACCESS.2018.2793841 Al-Fuqaha, 2015, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Commun. Surv. Tutor., 17, 2347, 10.1109/COMST.2015.2444095 Anthi, 2021, Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks, Comput. Secur., 108, 1, 10.1016/j.cose.2021.102352 Borgiani, 2021, Toward a distributed approach for detection and mitigation of denial-of-service attacks within industrial internet of things, IEEE Internet Things J., 8, 4569, 10.1109/JIOT.2020.3028652 Lata, 2021, Secure and reliable WSN for internet of things: Challenges and enabling technologies, IEEE Access, 9, 161103, 10.1109/ACCESS.2021.3131367 Alsheikh, 2014, Machine learning in wireless sensor networks: Algorithms, strategies, and applications, IEEE Commun. Surv. Tutor., 16, 1996, 10.1109/COMST.2014.2320099 Dina, 2021, Intrusion detection based on machine learning techniques in computer networks, Internet Things, 16, 10.1016/j.iot.2021.100462 S.E. Quincozes, J.F. Kazienko, Machine Learning Methods Assessment for Denial of Service Detection in Wireless Sensor Networks, in: 6th IEEE World Forum on Internet of Things, WF-IoT, 2020, pp. 1–6. Almomani, 2016, WSN-DS: A dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016, 16, 10.1155/2016/4731953 Akkaya, 2005, A survey on routing protocols for wireless sensor networks, Ad Hoc Netw., 3, 325, 10.1016/j.adhoc.2003.09.010 Huang, 2022, Application of computer data mining technology based on AKN algorithm in denial of service attack defense detection, Wirel. Commun. Mob. Comput., 2022 Witten, 2011 Ribeiro, 2021, The entropy universe, Entropy, 23, 222, 10.3390/e23020222 Jimoh, 2019, Enhanced decision tree-J48 with SMOTE machine learning algorithm for effective botnet detection in imbalance dataset, 1 Al-Ahmadi, 2021, Performance evaluation of machine learning techniques for DoS detection in wireless sensor network, Int. J. Netw. Secur. Appl., 13, 1 Chauhan, 2013, A comparative study of classification techniques for Intrusion Detection, 40 El Khediri, 2020, Improved node localization using K-means clustering for Wireless Sensor Networks, Comp. Sci. Rev., 37 Sathyamoorthy, 2022, Improved K-means based q learning algorithm for optimal clustering and node balancing in WSN, Wirel. Pers. Commun., 122, 2745, 10.1007/s11277-021-09028-4 Yang, 2021, A novel cluster-based wireless sensor network reliability model using the expectation maximization algorithm, J. Sens., 2021 Javed, 2019 Almomani, 2018, Efficient denial of service attacks detection in wireless sensor networks, J. Inf. Sci. Eng., 34, 977 Mahbooba, 2021, Trust in intrusion detection systems: An investigation of performance analysis for machine learning and deep learning models, Complexity, 2021, 10.1155/2021/5538896 S. Ismail, T.T. Khoei, R. Marsh, N. Kaabouch, A Comparative Study of Machine Learning Models for Cyber-attacks Detection in Wireless Sensor Networks, in: IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, 2021, pp. 313–318. Kurtkoti, 2022, Performance analysis of machine learning algorithms in detecting and mitigating black and gray hole attacks, 945 F.G. Portela, F.A. Mendoza, L.C. Benavides, Evaluation of the performance of supervised and unsupervised Machine learning techniques for intrusion detection, in: IEEE International Conference on Applied Science and Advanced Technology, ICASAT, 2019, pp. 1–8. Salo, 2019, Clustering enabled classification using ensemble feature selection for intrusion detection, 276 El Mourabit, 2015, Intrusion detection techniques in wireless sensor network using data mining algorithms: Comparative evaluation based on attacks detection, Int. J. Adv. Comput. Sci. Appl., 6, 164 Aksu, 2018, Intrusion detection with comparative analysis of supervised learning techniques and Fisher score feature selection algorithm, 141 Aziz, 2017, Comparison of classification techniques applied for network intrusion detection and classification, J. Appl. Log., 24, 109, 10.1016/j.jal.2016.11.018 Raj, 2012, Security enhancement in wireless sensor networks using machine learning, 1264 Hasan, 2019, Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches, Internet Things, 7, 10.1016/j.iot.2019.100059 Belavagi, 2016, Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 89, 117, 10.1016/j.procs.2016.06.016 I. Sharafaldin, A.H. Lashkari, A.A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, in: ICISSP, Vol. 1, 2018, pp. 108–116. Pahl, 2018, All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection, 72 Mahbod, 2009, A detailed analysis of the KDD CUP 99 data set, 1 Moustafa, 2015, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 1 Ambusaidi, 2016, Building an intrusion detection system using a filter-based feature selection algorithm, IEEE Trans. Comput., 65, 2986, 10.1109/TC.2016.2519914 1999 Hall, 2009, The WEKA data mining software: an update, ACM SIGKDD Explor. Newsl., 11, 10, 10.1145/1656274.1656278 Holte, 1993, Very simple classification rules perform well on most commonly used datasets, Mach. Learn., 11, 63, 10.1023/A:1022631118932 Bej, 2021, LoRAS: An oversampling approach for imbalanced datasets, Mach. Learn., 110, 279, 10.1007/s10994-020-05913-4 Jollois, 2007, Speed-up for the expectation-maximization algorithm for clustering categorical data, J. Global Optim., 37, 513, 10.1007/s10898-006-9059-3 De Abreu, 2021, Fast logic optimization using decision trees, 1 Osho, 2021, Network intrusion detection system using principal component analysis algorithm and decision tree classifier, 273 Quincozes, 2021, Counselors network for intrusion detection, Int. J. Netw. Manage., 31, 10.1002/nem.2111