| Literature DB >> 26447696 |
Xuemei Sun1, Bo Yan1, Xinzhong Zhang1, Chuitian Rong1.
Abstract
Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.Entities:
Mesh:
Year: 2015 PMID: 26447696 PMCID: PMC4598086 DOI: 10.1371/journal.pone.0139513
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Cluster-based WSN.
Fig 2The integrated intrusion detection model of cluster-based WSN.
Fig 3Cluster-based anomaly detection flow.
Fig 4CA-AFSA-BP mis-use detection of flow.
Fig 5A global framework of CA-AFSA-BP.
Fig 6BP neural network.
Selection of training and test samples.
| Normal | Probe | DoS | U2R | R2L | Total | |
|---|---|---|---|---|---|---|
| Anomaly detection training set | 3000 | 2000 | 5000 | |||
| Anomaly detection test set | 2000 | 1000 | 3000 | |||
| Mis-use detection training set | 805 | 767 | 3133 | 52 | 243 | 5000 |
| Mis-use detection test set | 483 | 460 | 1880 | 31 | 146 | 3000 |
Cluster-based anomaly detection results.
| Level | Position | The number of features |
|
|
|---|---|---|---|---|
| Level 1 | Sensor node | 5 | 100 | 30.30 |
| Level 2 | Cluster head | 10 | 96.62 | 29.45 |
| Level 3 | Sink node | 18 | 92.47 | 8.56 |
| Level 4 | Sink node | 18 | 92.40 | 1.66 |
Comparison of Adaboost with and without hierarchical structures.
| Adaboost without hierarchical structures | Adaboost with hierarchical structures | |
|---|---|---|
|
| 92.35 | 92.40 |
|
| 8.50 | 1.66 |
Classification Results of 4 intrusion detection algorithms.
| Type | BP | SVM | PSO-BP | CA-AFSA-BP |
|---|---|---|---|---|
|
|
|
|
| |
| Probe | 78.91 | 75.65 | 73.91 | 76.30 |
| DoS | 82.50 | 96.28 | 97.87 | 98.03 |
| U2R | 6.45 | 9.68 | 12.90 | 19.35 |
| R2L | 29.45 | 26.71 | 20.54 | 30.14 |
| Totle | 78.03 | 87.41 | 87.96 | 89.55 |
DR and FR of 4 intrusion detection algorithms.
|
|
| |
|---|---|---|
| BP | 2.07 | 82.43 |
| SVM | 2.48 | 89.03 |
| PSO-BP | 1.86 | 89.60 |
| CA-AFSA-BP | 1.66 | 90.43 |