Skip to main content
Log in

Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network

  • Published:
Optical Memory and Neural Networks Aims and scope Submit manuscript

Abstract

From the last decade, the use of internet and its growth is continuously increasing. Similarly, numbers of services are coming out along with the internet and it is being used for providing facilities to human beings. Wireless sensor have been used for various application such as fire safety, military application, petroleum industry, security system, monitoring and environmental condition and many more. WSN node exposes itself to various security related attacks due to low battery power supply, low bandwidth support, data transmission over multi hop node, dependency on intermediate or other nodes, distributed in nature and self-organization. The WSN attacks observe in all layers of OSI model. Wireless sensor nodes has various issues because of that, it experiences number problem related to its functionalities and some malfunction due to attacks. It is require to build defence and network monitoring system for identifying attacks and prevent them. Intrusion detection system (IDS) plays an important role to detect threads inside the system and generate the alert related to the attack. In this work, supervised classification models for intrusion detection are built using such as Random Forest classifier, Support Vector Machine, Decision Tree Classifier, LGBM Classifier, Extra Tree Classifier, Gradient Boosting Classifier, Ada Boost Classifier, K Nearest Neighbour Classifier, MLP Classifier, Gaussian Naive Bayes Classifier and Logistic Regression Classifier. The NSLKDD, i.e. Modified version of the KDD99 Data Set on which we checks these algorithms. Experimental results how the highest accuracy relative to other classification systems in the support vector machine.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.
Fig. 11.
Fig. 12.
Fig. 13.
Fig. 14.
Fig. 15.

Similar content being viewed by others

REFERENCES

  1. Carlos-Mancilla, M., López-Mellado, E., and Siller, M., Wireless sensor networks formation: approaches and techniques, J. Sens., 2016, vol. 2016, art. ID 2081902.

    Article  Google Scholar 

  2. Ali, A., Ming, Y., Chakraborty, S., and Iram, S., A comprehensive survey on real-time applications of WSN, Future Internet, 2017, vol. 9, no. 4.

  3. Hussein, S.M., Performance evaluation of intrusion detection system using anomaly and signature based algorithms to reduction false alarm rate and detect unknown, Proc. 2016 Int. Conf. on Computational Science and Computational Intelligence (CSCI), Piscataway, NJ: Inst. Electr. Electron. Eng., 2016, pp. 1064–1069.

  4. Belavagi, M.C. and Muniyal, B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Comput. Sci., 2016, vol. 89, pp. 117–123.

    Article  Google Scholar 

  5. Xu, C., Shen, J., Du, X., and Zhang, F., An intrusion detection system using a deep neural network with gated recurrent units, IEEE Access, 2018, vol. 6, pp. 48697–48707.

    Article  Google Scholar 

  6. Li, W., Yi, P., Wu, Y., Pan, L., and Li, J., A new intrusion detection system based on KNN classification algorithm in wireless sensor network, J. Electr. Comput. Eng., 2014, vol. 2014, no. 1, art. ID 240217.

    Google Scholar 

  7. Vinayakumar, R., Alazab, M, Soman, K.P., Poornachandran, P., Al-Nemrat, A., and Venkatraman, S., Deep learning approach for intelligent intrusion detection system, IEEE Access, 2019, vol. 7, pp. 41525–41550.

    Article  Google Scholar 

  8. Soliman, N., Hikal, A., and Sakr, N.A., A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egypt. Inf. J., 2012, vol. 13, no. 3, pp. 225–238.

    Google Scholar 

  9. El Mourabit, Y., Bouirden, A., Toumanari, A., and Moussaid, N.E., Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection, Int. J. Adv. Comput. Sci. Appl., 2014, vol. 6, no. 9, pp. 164–172.

    Google Scholar 

  10. Nadiammai, G.V. and Hemalatha, M., Effective approach toward Intrusion Detection System using data mining techniques, Egypt. Inf. J., 2014, vol. 15, no. 1, pp 37–50.

    Google Scholar 

  11. Panda, M., Abraham, A., and Patra, M.R., A hybrid intelligent approach for network intrusion detection, Procedia Eng., 2012, vol. 30, no. 2011, pp. 1–9.

  12. Wattanapongsakorn, S.N. and Charnsripinyo, C., Practical real-time intrusion detection using machine learning approaches, Comput. Commun., 2011, vol. 34, no. 8, pp. 2227–2235.

    Article  Google Scholar 

  13. Koc, L. and Carswell, A.D., Network intrusion detection using a hidden Naïve Bayes binary classifier, Int. J. Simul.: Syst., Sci. Technol., 2015, vol. 16, no. 3, pp. 3.1-3.6.

  14. Li, Y., Zhang, X.J., Yan, J., Ai, X., and Dai, K., An efficient intrusion detection system based on support vector machines and gradually feature removal method, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 424–430.

    Article  Google Scholar 

  15. Shin, S., Kwon, G., Jo, G.-Y., Park, Y., and Rhy, H., An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans. Ind. Inf., 2010, vol. 6, pp. 744–757.

    Article  Google Scholar 

  16. Sindhu, S., Geetha, S., and Kannan, A., Decision tree based light weight intrusion detection using a wrapper approach, Expert Syst. Appl., 2012, vol. 39, no. 1, pp. 129–141.

    Article  Google Scholar 

  17. Farooqi, A.H.F., Khan, A., Wang, J., and Lee, S., A novel intrusion detection framework for wireless sensor networks, Pers. Ubiquitous Comput., 2013, vol. 17, no. 5, pp. 907–919.

    Article  Google Scholar 

  18. Yin, C., Zhu, Y., Fei, J., and He, X., A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, 2017, vol. 5, pp. 21954–21961.

    Article  Google Scholar 

  19. Mandot, P., What is LightGBM, How to implement it? How to fine tune the parameters? 2017. https://medium.com/pushkarmandot/https-medium-com-pushkarmandot-what-is-lightgbm-how-to-implement-it-how-to-fine-tune-the-parameters-60347819b7fc. Accessed May 31, 2019.

  20. Brownlee, J., Ensemble machine learning algorithms in Python with scikit-learn, Python Machine Learning, 2016. https://machinelearningmastery.com/ensemble-machine-learning-algorithms-python-scikit-learn/. Accessed May 31, 2019.

  21. Biau, G. and Cadre, B., Optimization by gradient boosting, 2017. arXiv:1707.05023.

  22. Tharwat, A., AdaBoost classifier: an overview, 2018. https://doi.org/10.13140/RG.2.2.19929.01122

  23. Kumar, D.P., Amgoth, T., and Annavarapu, C.S.R., Machine learning algorithms for wireless sensor networks: a survey, Inf. Fusion, 2019, vol. 49, pp. 1–25.

    Article  Google Scholar 

  24. Mitchell, R. and Chen, I.R., A survey of intrusion detection in wireless network applications, Comput. Commun., 2014, vol. 42, pp.1–23.

    Article  Google Scholar 

  25. Wan, S., Liang, Y., Zhang, Y., and Guizani, M., Deep multi-layer perceptron classifier for behavior analysis to estimate Parkinson’s disease severity using smartphones, IEEE Access, 2018, vol. 6, pp. 36825–36833.

    Article  Google Scholar 

  26. Almomani, I., Al-Kasasbeh, B., and AL-Akhras, M., Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016, vol. 2016, art. ID 4731953.

    Article  Google Scholar 

  27. Boutaba, R., et al., A comprehensive survey on machine learning for networking: evolution, applications and research opportunities, J. Internet Serv. Appl., 2018, vol. 9, no. 16, p. 99.

    Article  Google Scholar 

  28. Mahdavifar, S. and Ghorbani, A.A., Application of deep learning to cybersecurity: a survey, Neurocomputing, 2019, vol. 347, pp. 149–176.

    Article  Google Scholar 

  29. KDD Cup 1999 data, UCI KDD archive, University of California, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed May 31, 2019.

  30. NSL-KDD dataset, University of New Brunswick. https://www.unb.ca/cic/datasets/nsl.html. Accessed May 31, 2019.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashwini B. Abhale.

Ethics declarations

Disclosure of potential conflicts of interest: There is no potential of conflict of Interest between the authors regarding the manuscript preparation and submission.

Research involving Human Participants and/or Animals: There is no involvement of Human participants or Animals used in this manuscript.

Informed consent: There is nothing to report.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ashwini B. Abhale, Manivannan, S.S. Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network. Opt. Mem. Neural Networks 29, 244–256 (2020). https://doi.org/10.3103/S1060992X20030029

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S1060992X20030029

Keywords:

Navigation