• DocumentCode
    652532
  • Title

    Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks

  • Author

    Coppolino, Luigi ; D´Antonio, Salvatore ; Garofalo, Alessia ; Romano, Lucia

  • Author_Institution
    Dept. of Technol., Univ. of Naples Parthenope, Naples, Italy
  • fYear
    2013
  • fDate
    28-30 Oct. 2013
  • Firstpage
    247
  • Lastpage
    254
  • Abstract
    Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They have many potential applications for both civil and military tasks. However, the unattended nature of WSNs and the limited computational and energy resources of their nodes make them susceptible to many types of attacks. Intrusion detection is one of the major and efficient defence methods against attacks in a network infrastructure. Intrusion Detection Systems can be seen as the second line of defence and they complement the security primitives that are adopted in order to prevent attacks against the computer network being protected. The peculiar features of a wireless sensor network pose stringent requirements to the design of intrusion detection systems. In this paper, we propose a hybrid, lightweight, distributed Intrusion Detection System (IDS) for wireless sensor networks. This IDS uses both misuse-based and anomaly-based detection techniques. It is composed of a Central Agent, which performs highly accurate intrusion detection by using data mining techniques, and a number of Local Agents running lighter anomaly-based detection techniques on the motes. Decision trees have been adopted as classification algorithm in the detection process of the Central Agent and their behaviour has been analysed in selected attacks scenarios. The accuracy of the proposed IDS has been measured and validated through an extensive experimental campaign. This paper presents the results of these experimental tests.
  • Keywords
    computer network security; data mining; decision trees; pattern classification; wireless sensor networks; WSN; anomaly-based detection technique; attack prevention; central agent; civil task; classification algorithm; computational resource; computer network protection; data mining technique; decision tree; defence method; distributed IDS; energy resource; hybrid IDS; intrusion detection system; lightweight IDS; local agent; military task; misuse-based detection technique; network infrastructure; security primitive; wireless sensor network; Decision trees; Intrusion detection; Monitoring; Routing; Routing protocols; Wireless sensor networks; Wireless Sensor Networks; data mining; decision trees; intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on
  • Conference_Location
    Compiegne
  • Type

    conf

  • DOI
    10.1109/3PGCIC.2013.43
  • Filename
    6681236