Abstract—
From the last decade, the use of internet and its growth is continuously increasing. Similarly, numbers of services are coming out along with the internet and it is being used for providing facilities to human beings. Wireless sensor have been used for various application such as fire safety, military application, petroleum industry, security system, monitoring and environmental condition and many more. WSN node exposes itself to various security related attacks due to low battery power supply, low bandwidth support, data transmission over multi hop node, dependency on intermediate or other nodes, distributed in nature and self-organization. The WSN attacks observe in all layers of OSI model. Wireless sensor nodes has various issues because of that, it experiences number problem related to its functionalities and some malfunction due to attacks. It is require to build defence and network monitoring system for identifying attacks and prevent them. Intrusion detection system (IDS) plays an important role to detect threads inside the system and generate the alert related to the attack. In this work, supervised classification models for intrusion detection are built using such as Random Forest classifier, Support Vector Machine, Decision Tree Classifier, LGBM Classifier, Extra Tree Classifier, Gradient Boosting Classifier, Ada Boost Classifier, K Nearest Neighbour Classifier, MLP Classifier, Gaussian Naive Bayes Classifier and Logistic Regression Classifier. The NSLKDD, i.e. Modified version of the KDD99 Data Set on which we checks these algorithms. Experimental results how the highest accuracy relative to other classification systems in the support vector machine.
Similar content being viewed by others
REFERENCES
Carlos-Mancilla, M., López-Mellado, E., and Siller, M., Wireless sensor networks formation: approaches and techniques, J. Sens., 2016, vol. 2016, art. ID 2081902.
Ali, A., Ming, Y., Chakraborty, S., and Iram, S., A comprehensive survey on real-time applications of WSN, Future Internet, 2017, vol. 9, no. 4.
Hussein, S.M., Performance evaluation of intrusion detection system using anomaly and signature based algorithms to reduction false alarm rate and detect unknown, Proc. 2016 Int. Conf. on Computational Science and Computational Intelligence (CSCI), Piscataway, NJ: Inst. Electr. Electron. Eng., 2016, pp. 1064–1069.
Belavagi, M.C. and Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 2016, vol. 89, pp. 117–123.
Xu, C., Shen, J., Du, X., and Zhang, F., An intrusion detection system using a deep neural network with gated recurrent units, IEEE Access, 2018, vol. 6, pp. 48697–48707.
Li, W., Yi, P., Wu, Y., Pan, L., and Li, J., A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electr. Comput. Eng., 2014, vol. 2014, no. 1, art. ID 240217.
Vinayakumar, R., Alazab, M, Soman, K.P., Poornachandran, P., Al-Nemrat, A., and Venkatraman, S., Deep learning approach for intelligent intrusion detection system, IEEE Access, 2019, vol. 7, pp. 41525–41550.
Soliman, N., Hikal, A., and Sakr, N.A., A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egypt. Inf. J., 2012, vol. 13, no. 3, pp. 225–238.
El Mourabit, Y., Bouirden, A., Toumanari, A., and Moussaid, N.E., Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection, Int. J. Adv. Comput. Sci. Appl., 2014, vol. 6, no. 9, pp. 164–172.
Nadiammai, G.V. and Hemalatha, M., Effective approach toward Intrusion Detection System using data mining techniques, Egypt. Inf. J., 2014, vol. 15, no. 1, pp 37–50.
Panda, M., Abraham, A., and Patra, M.R., A hybrid intelligent approach for network intrusion detection, Procedia Eng., 2012, vol. 30, no. 2011, pp. 1–9.
Wattanapongsakorn, S.N. and Charnsripinyo, C., Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 2011, vol. 34, no. 8, pp. 2227–2235.
Koc, L. and Carswell, A.D., Network intrusion detection using a hidden Naïve Bayes binary classifier, Int. J. Simul.: Syst., Sci. Technol., 2015, vol. 16, no. 3, pp. 3.1-3.6.
Li, Y., Zhang, X.J., Yan, J., Ai, X., and Dai, K., An efficient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 424–430.
Shin, S., Kwon, G., Jo, G.-Y., Park, Y., and Rhy, H., An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans. Ind. Inf., 2010, vol. 6, pp. 744–757.
Sindhu, S., Geetha, S., and Kannan, A., Decision tree based light weight intrusion detection using a wrapper approach, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 129–141.
Farooqi, A.H.F., Khan, A., Wang, J., and Lee, S., A novel intrusion detection framework for wireless sensor networks, Pers. Ubiquitous Comput., 2013, vol. 17, no. 5, pp. 907–919.
Yin, C., Zhu, Y., Fei, J., and He, X., A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 2017, vol. 5, pp. 21954–21961.
Mandot, P., What is LightGBM, How to implement it? How to fine tune the parameters? 2017. https://medium.com/pushkarmandot/https-medium-com-pushkarmandot-what-is-lightgbm-how-to-implement-it-how-to-fine-tune-the-parameters-60347819b7fc. Accessed May 31, 2019.
Brownlee, J., Ensemble machine learning algorithms in Python with scikit-learn, Python Machine Learning, 2016. https://machinelearningmastery.com/ensemble-machine-learning-algorithms-python-scikit-learn/. Accessed May 31, 2019.
Biau, G. and Cadre, B., Optimization by gradient boosting, 2017. arXiv:1707.05023.
Tharwat, A., AdaBoost classifier: an overview, 2018. https://doi.org/10.13140/RG.2.2.19929.01122
Kumar, D.P., Amgoth, T., and Annavarapu, C.S.R., Machine learning algorithms for wireless sensor networks: a survey, Inf. Fusion, 2019, vol. 49, pp. 1–25.
Mitchell, R. and Chen, I.R., A survey of intrusion detection in wireless network applications, Comput. Commun., 2014, vol. 42, pp.1–23.
Wan, S., Liang, Y., Zhang, Y., and Guizani, M., Deep multi-layer perceptron classifier for behavior analysis to estimate Parkinson’s disease severity using smartphones, IEEE Access, 2018, vol. 6, pp. 36825–36833.
Almomani, I., Al-Kasasbeh, B., and AL-Akhras, M., Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016, vol. 2016, art. ID 4731953.
Boutaba, R., et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, J. Internet Serv. Appl., 2018, vol. 9, no. 16, p. 99.
Mahdavifar, S. and Ghorbani, A.A., Application of deep learning to cybersecurity: a survey, Neurocomputing, 2019, vol. 347, pp. 149–176.
KDD Cup 1999 data, UCI KDD archive, University of California, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed May 31, 2019.
NSL-KDD dataset, University of New Brunswick. https://www.unb.ca/cic/datasets/nsl.html. Accessed May 31, 2019.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Disclosure of potential conflicts of interest: There is no potential of conflict of Interest between the authors regarding the manuscript preparation and submission.
Research involving Human Participants and/or Animals: There is no involvement of Human participants or Animals used in this manuscript.
Informed consent: There is nothing to report.
About this article
Cite this article
Ashwini B. Abhale, Manivannan, S.S. Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network. Opt. Mem. Neural Networks 29, 244–256 (2020). https://doi.org/10.3103/S1060992X20030029
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S1060992X20030029