Abstract
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Corral, G., Armengol, E., Fornells, A., Golobardes, E.: Explanations of unsupervised learning clustering applied to data security analysis. Neurocomputing 72(13-15), 2754–2762 (2009)
Herrero, A., Corchado, E., Pellicer, M.A., Abraham, A.: MOVIH-IDS: A mobile-visualization hybrid intrusion detection system. Neurocomputing 72(13-15), 2775–2784 (2009)
Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. In: 4th International Conference on Security and Privacy for Communication Networks. ACM, New York (2008)
Hai, T.H., Khan, F., Huh, E.-n.: Hybrid Intrusion Detection System for Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 383–396. Springer, Heidelberg (2007)
Onat, I., Miri, A.: A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. In: Systems Communications, pp. 422–427. IEEE Press, Los Alamitos (2005)
Wallenta, C., Kim, J., Bentley, P.J., Hailes, S.: Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm. Appl. Intell. 32, 1–26 (2010)
Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting Selective Forwarding Attacks in WSNs using Support Vector Machines. In: Int. Sensors, Sensor Networks and Inf. Proc. Conf., pp. 335–340. IEEE Press, Los Alamitos (2007)
Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. Int. J. of Dist. Sens. Net. 2(4), 313–332 (2006)
Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J.M., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving Security for SCADA Sensor Networks with Reputation Systems and SOMs. Sensors 9, 9380–9397 (2009)
Banković, Z., Moya, J.M., Araujo, A., Fraga, D., Vallejo, J.C., de Goyeneche, J.M.: Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps. Int. Comp. Aided Design 17(2), 87–102 (2010)
Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48 (2008)
Muñoz, A., Muruzábal, J.: Self-Organizing Maps for Outlier Detection. Neurocomputing 18(1-3), 33–60 (1998)
Roosta, T.G.: Attacks and Defenses on Ubiquitous Sensor Networks, Ph. D. Dissertation, University of California at Berkeley (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banković, Z., Moya, J.M., Vallejo, J.C., Fraga, D. (2011). Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds) Hybrid Artificial Intelligent Systems. HAIS 2011. Lecture Notes in Computer Science(), vol 6678. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21219-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-21219-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21218-5
Online ISBN: 978-3-642-21219-2
eBook Packages: Computer ScienceComputer Science (R0)