Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Title | Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Al-issa, Abdulaziz I., Al-Akhras, Mousa, ALsahli, Mohammed S., Alawairdhi, Mohammed |
Conference Name | 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) |
ISBN Number | 978-1-5386-7942-5 |
Keywords | attack signature, computer network security, Decision trees, decision trees technique, denial of service, denial-of-service attack, DoS attacks, hardware resources, intrusion detection system, intrusion detection-and-prevention system, learning (artificial intelligence), machine learning techniques, Measurement, Metrics, privacy, pubcrawl, Routing protocols, security, security threats, Support vector machines, threat vectors, Wireless sensor networks, WSN |
Abstract | Widespread use of Wireless Sensor Networks (WSNs) introduced many security threats due to the nature of such networks, particularly limited hardware resources and infrastructure less nature. Denial of Service attack is one of the most common types of attacks that face such type of networks. Building an Intrusion Detection and Prevention System to mitigate the effect of Denial of Service attack is not an easy task. This paper proposes the use of two machine learning techniques, namely decision trees and Support Vector Machines, to detect attack signature on a specialized dataset. The used dataset contains regular profiles and several Denial of Service attack scenarios in WSNs. The experimental results show that decision trees technique achieved better (higher) true positive rate and better (lower) false positive rate than Support Vector Machines, 99.86% vs 99.62%, and 0.05% vs. 0.09%, respectively. |
URL | https://ieeexplore.ieee.org/document/8717400 |
DOI | 10.1109/JEEIT.2019.8717400 |
Citation Key | al-issa_using_2019 |
- machine learning techniques
- WSN
- wireless sensor networks
- threat vectors
- Support vector machines
- security threats
- security
- Routing protocols
- pubcrawl
- privacy
- Metrics
- Measurement
- attack signature
- learning (artificial intelligence)
- intrusion detection-and-prevention system
- intrusion detection system
- hardware resources
- DoS attacks
- denial-of-service attack
- denial of service
- decision trees technique
- Decision trees
- computer network security