DWT-based anomaly detection method for cyber security of wireless sensor networks

被引:9
|
作者
Saganowski, Lukasz [1 ]
Andrysiak, Tomasz [1 ]
Kozik, Rafal [1 ]
Choras, Michal [1 ]
机构
[1] Univ Sci & Technol, Bydgoszcz, Poland
关键词
cyber security; critical infrastructures protection (CIP); anomaly detection; wireless sensor networks (WSN); signal processing; discrete wavelet transform (DWT);
D O I
10.1002/sec.1550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures are exposed to many natural and man-made hazards and threats. Recently, in the era of moving previously disconnected (tele)-monitoring, control and supervisory systems (e.g., information and communication technologies or supervisory control and data acquisition) towards full network connection, the risk of cyber attacks on such systems is continuously growing. One of the current trends in information and communication technology systems controlling critical infrastructures (such as energy grids, telecommunication networks, or water systems) is deployment of wireless sensor networks. Therefore, the cyber security of the mentioned networks becomes an important challenge to be solved. In this paper, we propose a discrete wavelet transform-based method of anomaly detection in wireless sensor networks that could be deployed in critical infrastructures (e.g., in energy grids, to measure some parameters). The major contribution of the paper is the implementation of the innovative SNORT-based pre-processor using the effective anomaly detection methods based on discrete wavelet transform. We apply the discrete wavelet transform to 26 network traffic parameters measured in our realistic testbed. We also discuss which parameters of the traffic are most useful for such purpose. Moreover, we implement our method as an algorithm in a dedicated SNORT preprocessor in order to be compliant with this popular state of the art intrusion detection system. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:2911 / 2922
页数:12
相关论文
共 50 条
  • [1] A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor Networks
    Chen, Yunhong
    Li, Shuming
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1235 - 1256
  • [2] A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor Networks
    Yunhong Chen
    Shuming Li
    [J]. Wireless Personal Communications, 2019, 105 : 1235 - 1256
  • [3] An anomaly detection method based on feature mining for wireless sensor networks
    Ding, Xuefeng
    Feng, Wen
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 36 (03) : 167 - 173
  • [4] A Danger Model Based Anomaly Detection Method for Wireless Sensor Networks
    Zhang, Kui
    [J]. 2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 1, 2009, : 11 - 14
  • [5] An Anomaly Detection Method for Wireless Sensor Networks Based on the Improved Isolation Forest
    Chen, Junxiang
    Zhang, Jilin
    Qian, Ruixiang
    Yuan, Junfeng
    Ren, Yongjian
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [6] An isolation principle based distributed anomaly detection method in wireless sensor networks
    Ding Z.-G.
    Du D.-J.
    Fei M.-R.
    [J]. International Journal of Automation and Computing, 2015, 12 (04) : 402 - 412
  • [7] An Isolation Principle Based Distributed Anomaly Detection Method in Wireless Sensor Networks
    Zhi-Guo Ding
    Da-Jun Du
    Min-Rui Fei
    [J]. International Journal of Automation and Computing, 2015, (04) : 402 - 412
  • [8] Anomaly detection in wireless sensor networks
    Rajasegarar, Sutharshan
    Leckie, Christopher
    Palaniswami, Marimuthu
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 34 - 40
  • [9] Security Detection Method for Clustering Wireless Sensor Networks Based on Markov Chain
    Dong, Na
    Chen, Ze
    Liu, Weina
    Hou, Botao
    [J]. Engineering Intelligent Systems, 2022, 30 (01): : 55 - 65
  • [10] Online anomaly detection method based on BBO ensemble pruning in wireless sensor networks
    Ding, Zhiguo
    Fei, Minrui
    Du, Dajun
    Xu, Sheng
    [J]. Communications in Computer and Information Science, 2014, 461 : 160 - 169