Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems

Authors

  • Tasneem Rahath  Assistant Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Ch Anusha  Students, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • B Divya Sri  Students, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Wireless Sensor Network (WSN), Security, Routing, Intrusion Detection System (IDS), Attack, Detection, Response & Tracking.

Abstract

Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.

References

  1. S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy; A Comparison of Routing Attacks on Wireless Sensor Networks; Journal of Information Assurance and Security (JIAS); ISSN 1554-1010 Volume 6, pp. 195-215; 2011.
  2. S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy; A Comparison of Link Layer Attacks on Wireless Sensor Networks; Journal of Information Security (JIS); 2011.
  3. K. Sharma and M. K. Ghose; Wireless Sensor Networks: An Overview on its Security Threats; IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs; CSE Department, SMIT, Sikkim, India; 2010.
  4. T. A. Zia; A Security Framework for Wireless Sensor Networks; Doctor of Philosophy Thesis; The School of Information Technologies, University of Sydney; Feb 2008.
  5. M. Saxena; Security in Wireless Sensor Networks: A Layer-based Classification; Department of Computer Science, Purdue University.
  6. Z. Li and G. Gong; A Survey on Security in Wireless Sensor Networks; Department of Electrical and Computer Engineering, University of Waterloo, Canada.
  7. A. Dimitrievski, V. Pejovska and D. Davcev; Security Issues and Approaches in WSN; Department of computer science, Faculty of Electrical Engineering and Information Technology; Skopje, Republic of Macedonia.
  8. J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier's Computer Networks Journal 52 (2292-2330); Department of Computer Science, University of California; 2008.
  9. C. Karlof and D. Wagner; Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures; Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols; In First IEEE International Workshop on Sensor Network Protocols and Applications; University of California at Berkeley, Berkeley, USA; 2003.
  10. A. Perrig, R. Szewczyk, V. Wen, D. culler and D. Tygar; SPINS: Security Protocols for Sensor Networks; Wireless Networking ACM CCS; 2003.
  11. B. Krishnamachari, D. Estrin, and S. Wicker; The Impact of Data Aggregation in Wireless Sensor Networks; International Workshop on Distributed Event-Based Systems, (DEBS '02), p 457-458; 2002.
  12. V. Handziski, A. K¨opke, H Karl, C. Frank, and W. Drytkiewicz; Improving The Energy Efficiency of Directed Diffusion Using Passive Clustering; in Proc. 1st European Workshop on Wireless Sensor Networks, pp. 172 – 187, Berlin, Germany; 2004.
  13. K. Scarfone and P. Mell; Guide to Intrusion Detection and Prevention Systems (IDPS); NIST 800-94; Feb 2007.
  14. G. Maselli, L. Deri and S. Suin; Design and Implementation of an Anomaly Detection System: an Empirical Approach; University of Pisa, Italy; 2002.
  15. V. Chandala, A. Banerjee and V. Kumar; Anomaly Detection: A Survey; ACM Computing Surveys; University of Minnesota; Sep 2009.
  16. Ch. Krügel and Th. Toth; A Survey on Intrusion Detection Systems; TU Vienna , Austria; 2000.
  17. J. Molina and M. Cukier; Evaluating Attack Resiliency for Host Intrusion Detection Systems; Information Assurance and Security Journal; 2009.
  18. S. Selliah; Mobile Agent-Based Attack Resistant Architecture for Distributed Intrusion Detection System; MSc Thesis, College of Engineering and Mineral Resources at West Virginia University; 2001.
  19. A. K. Jones and R. S. Sielken; Computer System Intrusion Detection: A Survey; University of Virginia, USA.
  20. S. Northcutt and J. Novak; Network Intrusion Detection: An Analyst's Handbook; New Riders Publishing; Thousand Oaks, CA, USA; 2002.
  21. S. Zanero and S. M. Savaresi; Unsupervised Learning Techniques for an Intrusion Detection System; ACM Symposium on Applied Computing; 2004.
  22. O. Depren, M. Topallar, E. narim and M. K. Ciliz; An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks; 2005.
  23. R. A. Kemmerer and G. Vigna; Intrusion Detection: A Brief History and Overview; 2002

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
Tasneem Rahath, Ch Anusha, B Divya Sri "Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 5, pp.306-310, September-October-2022.