Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

被引:0
|
作者
Salim Salmi
Lahcen Oughdir
机构
[1] Sidi Mohamed Ben Abdellah University,Engineering, Systems and Applications Laboratory, ENSA
来源
关键词
Wireless sensor networks (WSNs); Intrusion detection system (IDS); Denial of service (DOS); Deep learning (DL);
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used remotely to collect data about the activities and conditions of a particular area, for example, temperature, pressure, motion. Each sensor node is usually small, inexpensive, and relatively easy to deploy compared to other sensing methods. For this reason, WSNs are used in a wide range of applications and industries. However, WSNs are vulnerable to different kinds of security threats and attacks. This is primarily because they are very limited in resources like power, storage, bandwidth, and processing power that could have been used in developing their defense. To ensure their security, an effective Intrusion detection system (IDS) need to be in place to detect these attacks even under these constraints. Today, traditional IDS are less effective as these malicious attacks are becoming more intelligent, frequent, and complex. Denial of service (DOS) attack is one of the main types of attacks that threaten WSNs. For this reason, we review related works that focus on detecting DoS attacks in WSN. In addition, we developed and implemented several Deep learning (DL) based IDS. These systems were trained on a specialized dataset for WSNs called WSN-DS in detecting four types of DoS attacks that affects WSNs. They include the Blackhole, Grayhole, Flooding, and Scheduling attacks. Finally, we evaluated and compared the results and we discuss possible future works.
引用
收藏
相关论文
共 50 条
  • [1] Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
    Salmi, Salim
    Oughdir, Lahcen
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [2] Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attacks
    Jiang Zhongqiu
    Yan Shu
    Wang Liangmin
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3117 - 3120
  • [3] Firmware-Based DoS Attacks in Wireless Sensor Network
    Phi Tuong Lau
    Katzenbeisser, Stefan
    [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 214 - 232
  • [4] Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
    Ahmad, Bilal
    Jian, Wang
    Enam, Rabia Noor
    Abbas, Ali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) : 1055 - 1069
  • [5] Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
    Bilal Ahmad
    Wang Jian
    Rabia Noor Enam
    Ali Abbas
    [J]. Wireless Personal Communications, 2021, 116 : 1055 - 1069
  • [6] DoS attack detection using online learning techniques in wireless sensor networks
    Lai, Trinh Thuc
    Tran, Tuan Phong
    Cho, Jaehyuk
    Yoo, Myungsik
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 85 : 307 - 319
  • [7] Detection of DoS attacks using machine learning techniques
    Kumar, Deepak
    Kukreja, Vinay
    Kadyan, Virender
    Mittal, Mohit
    [J]. International Journal of Vehicle Autonomous Systems, 2020, 15 (3-4): : 256 - 270
  • [8] An optimized deep neural network based DoS attack detection in wireless video sensor network
    Ramesh, S.
    Yaashuwanth, C.
    Prathibanandhi, K.
    Basha, Adam Raja
    Jayasankar, T.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [9] An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting
    Ben Atitallah, Safa
    Driss, Maha
    Boulila, Wadii
    Almomani, Iman
    [J]. ADVANCES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022, 2022, 1653 : 180 - 192
  • [10] Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection
    El Mourabit, Yousef
    Bouirden, Anouar
    Toumanari, Ahmed
    El Moussaid, Nadya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (09) : 164 - 172