© The Institution of Engineering and Technology
Low-rate denial of service (LDoS) attack is a special DoS attack type of wireless sensor network (WSN). Routing protocol is the critical component of the WSN. Routing flood attack is a novel LDoS attack pattern in WSN. However, the attack is difficult to be detected by traditional intrusion detection algorithm. A novel LDoS attack detection method based on big data and signal analysis is proposed. Hilbert–Huang Transform (HHT) time–frequency signal analysis method is used to analyse the small non-linear signal from LDoS attack traffic signal. Spark-based Pearson and Spearman correlation coefficient calculation approaches are used to recognise the false intrinsic mode functions (IMFs) components decomposed by the HHT method. The effective threshold value of Pearson correlation coefficient is set to 0.2, the effective threshold value of Spearman correlation coefficient is set to 0.3, which are united to identify the false IMF components. SunSpot wireless nodes are used to build the wireless sensor nodes. If the difference between the IMF component and the normal IMF component is more than 40%, the LDoS attack will be detected. Experimental results show that this approach is effective to detect the LDoS attack in ZigBee WSN. This is a quantitative LDoS attack detection experimental research in WSN.
References
-
-
1)
-
12. Christopoulos, S.R.G., Kanarachos, S., Chroneos, A.: ‘Learning driver braking behavior using smartphones, neural networks and the sliding correlation coefficient: road anomaly case study’, IEEE Trans. Intell. Transp. Syst., 2018, 20, pp. 65–74.
-
2)
-
6. Kangfeng, Z., Xiujuan, W., Yixian, Y., et al: ‘Detecting DDoS attack with Hilbert-Huang transformation’, China Commun, 2011, 8, (2), pp. 126–133.
-
3)
-
7. Han, J.: ‘Network traffic anomaly detection using EMD and Hilbert-Huang transform’. , 2013.
-
4)
-
14. Gámez, N., Cubo, J., Fuentes, L., et al: ‘Configuring a context-aware middleware for wireless sensor networks’, Sensors, 2012, 12, (7), pp. 8544–8570.
-
5)
-
16. Chen, H., Meng, C., Shan, Z., et al: ‘A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust evaluation’, IEEE. Access., 2019, 7, pp. 32853–32866.
-
6)
-
9. Hongsong, C., Zhenzhou, J., Mingzeng, H.: ‘Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol’, J. Netw. Comput. Appl., 2007, 30, (1), pp. 145–166.
-
7)
-
15. Zimba, A., Chen, H., Wang, Z.: ‘Bayesian network based weighted APT attack paths modeling in cloud computing’, Future Gener. Comput. Syst., 2019, 96, (7), pp. 525–537.
-
8)
-
8. Hamedheidari, S., Rafeh, R.: ‘A novel agent-based approach to detect sinkhole attacks in wireless sensor networks’, Comput. Secur., 2013, 37, (20), pp. 1–14.
-
9)
-
17. Chen, H., Liu, M., Fu, Z.: ‘Using improved Hilbert-Huang transformation method to detect routing-layer reduce of quality attack in wireless sensor network’, Wirel. Pers. Commun., 2019, 104, (2), pp. 595–615.
-
10)
-
2. Zhang, X., Wu, Z., Zhang, J., et al: ‘An adaptive network traffic prediction approach for LDoS attacks detection’, Int. J. Commun. Syst., 2018, 31, p. e3505.
-
11)
-
11. Torrence, C., Compo, G.: ‘A practical guide to wavelet analysis’, Bull. Am. Meteorol. Soc., 1998, 79, (1), pp. 61–78.
-
12)
-
5. Huang, N.E., Shen, Z., Long, S.R.: ‘The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis’, Proc. R. Soc. Lond. A, 1998, 454, pp. 903–995.
-
13)
-
4. Wen, K., Yang, J., Cheng, F., et al: ‘Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly’. 2014 23rd Int. Conf. on Computer Communication and Networks (ICCCN), Shanghai, China, 2014, pp. 1–6.
-
14)
-
13. Wang, L., Yan, Y., Hu, Y., et al: ‘Rotational speed measurement through electrostatic sensing and correlation signal processing’, IEEE Trans. Instrum. Meas., 2014, 63, (5), pp. 1190–1199.
-
15)
-
18. Le, A., Loo, J.: ‘The impact of rank attack on network topology of routing protocol for low-power and lossy networks’, IEEE Sens. J., 2013, 13, (10), pp. 3685–3692.
-
16)
-
10. Yang, D., Pettersen, B., Andersson, H.I., et al: ‘Analysis of vortex splitting characteristics in the wake of an inclined flat plate using Hilbert-Huang transform’, Acta Mech., 2015, 226, (4), pp. 1085–1104.
-
17)
-
3. Yue, M., Liu, L., Wu, Z., et al: ‘Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network’, Int. J. Commun. Syst., 2018, 31, (2), pp. 1–13.
-
18)
-
1. Gunasekaran, M., Periakaruppan, S.: ‘A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks’, Int. J. Electron., 2017, 104, (6), pp. 993–1007.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5512
Related content
content/journals/10.1049/iet-ifs.2018.5512
pub_keyword,iet_inspecKeyword,pub_concept
6
6