Abstract
Anomaly detection can be used to detect malicious attacks in wireless sensor networks. Because of the autonomous nature of many sensor network scenarios, it is desirable to use an auto-configuring anomaly detector. To accomodate the indeterministic wireless environment, the anomaly detection must also be able to adapt to changing conditions. This work presents a dynamic learning extension for a pre-exisiting, auto-configuring anomaly detection system for WSNs. Adaptability always results in possibilities for an attacker to exploit the adapting system; however, no quantitative analysis of this has been yet performed in a WSN scenario. This paper explores the trade-off between adaptability and exploitability of the system. The paper also shows that adaptability does not guarantee better false positive error rates for all attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dudek, D.: DoS detection with markov chains. In: 9th European Conference on Wireless Sensor Networks (EWSN), Poster and Demo Proceedings (2012)
Dudek, D.: Collaborative detection of traffic anomalies using first order markov chains. In: 2012 Ninth International Conference on Networked Sensing Systems (INSS), pp. 1–4 (June 2012)
Krontiris, I., Giannetsos, T., Dimitriou, T.: Lidea: a distributed lightweight intrusion detection architecture for sensor networks. In: Proceedings of the 4th Int. Conf. on Security and Privacy in Communication Netowrks, SecureComm 2008, 20:1–20:10. ACM, New York (2008)
Su, W.T., Chang, K.M., Kuo, Y.H.: ehip: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks 51(4), 1151–1168 (2007)
Dudek, D., Haas, C., Kuntz, A., Zitterbart, M., Krüger, D., Rothenpieler, P., Pfisterer, D., Fischer, S.: A wireless sensor network for border surveillance. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009, pp. 303–304. ACM, New York (2009)
Wang, R., Du, W., Ning, P.: Containing denial-of-service attacks in broadcast authentication in sensor networks. In: Proceedings of the 8th ACM Int. Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, pp. 71–79. ACM, New York (2007)
Ye, N., Zhang, Y., Borror, C.: Robustness of the markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 53(1), 116–123 (2004)
Paschalidis, I.C., Chen, Y.: Statistical anomaly detection with sensor networks. ACM Trans. Sen. Netw. 7, 17:1–17:23 (2010)
Gao, Y., Chen, C., Bu, J., Dong, W., He, D.: Icad: Indirect correlation based anomaly detection in dynamic wsns. In: Proceedings of the Wireless Communications and Networking Conference (IEEE WCNC 2011), pp. 647–652 (March 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dudek, D. (2013). On the Detectability of Weak DoS Attacks in Wireless Sensor Networks. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-35890-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35889-0
Online ISBN: 978-3-642-35890-6
eBook Packages: Computer ScienceComputer Science (R0)