C 2017

Attack Detection Using Evolutionary Computation

STEHLÍK, Martin, Václav MATYÁŠ and Andriy STETSKO

Basic information

Original name

Attack Detection Using Evolutionary Computation

Authors

STEHLÍK, Martin (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution) and Andriy STETSKO (203 Czech Republic, belonging to the institution)

Edition

Germany, Computational Intelligence in Wireless Sensor Networks, p. 99-129, 31 pp. Studies in Computational Intelligence, 2017

Publisher

Springer International Publishing

Other information

Language

English

Type of outcome

Kapitola resp. kapitoly v odborné knize

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Germany

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

printed version "print"

RIV identification code

RIV/00216224:14330/17:00094468

Organization unit

Faculty of Informatics

ISBN

978-3-319-47713-8

UT WoS

000413356100006

Keywords in English

wireless sensor network; attack detection; evolutionary computation

Tags

International impact, Reviewed
Změněno: 13/5/2020 23:17, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

Wireless sensor networks (WSNs) are often deployed in open and potentially hostile environments. An attacker can easily capture the sensor nodes or replace them with malicious devices that actively manipulate the communication. Several intrusion detection systems (IDSs) have been proposed to detect different kinds of active attacks by sensor nodes themselves. However, the optimization of the IDSs w.r.t. the accuracy and also sensor nodes’ resource consumption is often left unresolved. We use multi-objective evolutionary algorithms to optimize the IDS with respect to three objectives for each specific WSN application and environment. The optimization on two detection techniques aimed at a selective forwarding attack and a delay attack is evaluated. Moreover, we discuss various attacker strategies ranging from an attacker behavior to a deployment of the malicious sensor nodes in the WSN. The robustness of the IDS settings optimized for six different attacker strategies is evaluated.

Links

VG20102014031, research and development project
Name: Experimentální vývoj bezpečnostní softwarové platformy se systémem detekce průniku a režimy ochrany soukromí pro bezdrátové senzorové sítě (Acronym: WSNSec)
Investor: Ministry of the Interior of the CR