access icon free Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network

Low-rate denial of service (LDoS) attack is a special DoS attack type of wireless sensor network (WSN). Routing protocol is the critical component of the WSN. Routing flood attack is a novel LDoS attack pattern in WSN. However, the attack is difficult to be detected by traditional intrusion detection algorithm. A novel LDoS attack detection method based on big data and signal analysis is proposed. Hilbert–Huang Transform (HHT) time–frequency signal analysis method is used to analyse the small non-linear signal from LDoS attack traffic signal. Spark-based Pearson and Spearman correlation coefficient calculation approaches are used to recognise the false intrinsic mode functions (IMFs) components decomposed by the HHT method. The effective threshold value of Pearson correlation coefficient is set to 0.2, the effective threshold value of Spearman correlation coefficient is set to 0.3, which are united to identify the false IMF components. SunSpot wireless nodes are used to build the wireless sensor nodes. If the difference between the IMF component and the normal IMF component is more than 40%, the LDoS attack will be detected. Experimental results show that this approach is effective to detect the LDoS attack in ZigBee WSN. This is a quantitative LDoS attack detection experimental research in WSN.

Inspec keywords: wireless sensor networks; Zigbee; correlation methods; routing protocols; time-frequency analysis; Hilbert transforms; computer network security

Other keywords: Hilbert–Huang Transform time–frequency signal analysis method; special DoS attack type; flood attack; quantitative LDoS attack detection experimental research; Spark-assisted correlation analysis approach; LDoS attack pattern; SunSpot wireless nodes; false intrinsic mode functions components; false IMF components; Spearman correlation coefficient; traditional intrusion detection algorithm; wireless sensor nodes; LDoS attack detection method; low-rate denial of service attack; nonlinear signal; big data; HHT method; ZigBee WSN; LDoS attack traffic signal; novel LDoS attack detection; wireless sensor network; normal IMF component; Pearson correlation coefficient; Spark-based Pearson; effective threshold value; routing protocol

Subjects: Wireless sensor networks; Protocols; Mathematical analysis; Mathematical analysis; Protocols; Communication network design, planning and routing; Integral transforms; Data security; Integral transforms

References

    1. 1)
      • 12. Christopoulos, S.R.G., Kanarachos, S., Chroneos, A.: ‘Learning driver braking behavior using smartphones, neural networks and the sliding correlation coefficient: road anomaly case study’, IEEE Trans. Intell. Transp. Syst., 2018, 20, pp. 6574.
    2. 2)
      • 6. Kangfeng, Z., Xiujuan, W., Yixian, Y., et al: ‘Detecting DDoS attack with Hilbert-Huang transformation’, China Commun, 2011, 8, (2), pp. 126133.
    3. 3)
      • 7. Han, J.: ‘Network traffic anomaly detection using EMD and Hilbert-Huang transform’. Western Carolina University (WCU) Thesis, 2013.
    4. 4)
      • 14. Gámez, N., Cubo, J., Fuentes, L., et al: ‘Configuring a context-aware middleware for wireless sensor networks’, Sensors, 2012, 12, (7), pp. 85448570.
    5. 5)
      • 16. Chen, H., Meng, C., Shan, Z., et al: ‘A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust evaluation’, IEEE. Access., 2019, 7, pp. 3285332866.
    6. 6)
      • 9. Hongsong, C., Zhenzhou, J., Mingzeng, H.: ‘Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol’, J. Netw. Comput. Appl., 2007, 30, (1), pp. 145166.
    7. 7)
      • 15. Zimba, A., Chen, H., Wang, Z.: ‘Bayesian network based weighted APT attack paths modeling in cloud computing’, Future Gener. Comput. Syst., 2019, 96, (7), pp. 525537.
    8. 8)
      • 8. Hamedheidari, S., Rafeh, R.: ‘A novel agent-based approach to detect sinkhole attacks in wireless sensor networks’, Comput. Secur., 2013, 37, (20), pp. 114.
    9. 9)
      • 17. Chen, H., Liu, M., Fu, Z.: ‘Using improved Hilbert-Huang transformation method to detect routing-layer reduce of quality attack in wireless sensor network’, Wirel. Pers. Commun., 2019, 104, (2), pp. 595615.
    10. 10)
      • 2. Zhang, X., Wu, Z., Zhang, J., et al: ‘An adaptive network traffic prediction approach for LDoS attacks detection’, Int. J. Commun. Syst., 2018, 31, p. e3505.
    11. 11)
      • 11. Torrence, C., Compo, G.: ‘A practical guide to wavelet analysis’, Bull. Am. Meteorol. Soc., 1998, 79, (1), pp. 6178.
    12. 12)
      • 5. Huang, N.E., Shen, Z., Long, S.R.: ‘The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis’, Proc. R. Soc. Lond. A, 1998, 454, pp. 903995.
    13. 13)
      • 4. Wen, K., Yang, J., Cheng, F., et al: ‘Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly’. 2014 23rd Int. Conf. on Computer Communication and Networks (ICCCN), Shanghai, China, 2014, pp. 16.
    14. 14)
      • 13. Wang, L., Yan, Y., Hu, Y., et al: ‘Rotational speed measurement through electrostatic sensing and correlation signal processing’, IEEE Trans. Instrum. Meas., 2014, 63, (5), pp. 11901199.
    15. 15)
      • 18. Le, A., Loo, J.: ‘The impact of rank attack on network topology of routing protocol for low-power and lossy networks’, IEEE Sens. J., 2013, 13, (10), pp. 36853692.
    16. 16)
      • 10. Yang, D., Pettersen, B., Andersson, H.I., et al: ‘Analysis of vortex splitting characteristics in the wake of an inclined flat plate using Hilbert-Huang transform’, Acta Mech., 2015, 226, (4), pp. 10851104.
    17. 17)
      • 3. Yue, M., Liu, L., Wu, Z., et al: ‘Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network’, Int. J. Commun. Syst., 2018, 31, (2), pp. 113.
    18. 18)
      • 1. Gunasekaran, M., Periakaruppan, S.: ‘A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks’, Int. J. Electron., 2017, 104, (6), pp. 9931007.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5512
Loading

Related content

content/journals/10.1049/iet-ifs.2018.5512
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading