Skip to main content

Evolutionary Fuzzy Rules for Intrusion Detection in Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Intelligent Networking and Collaborative Systems (INCoS 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1263))

  • 815 Accesses

Abstract

Next–generation digital services and applications often rely on large numbers of devices connected to a common communication backbone. The security of such massively distributed systems is a major issue and advanced methods to improve their ability to detect and counter cybernetic attacks are needed. Evolutionary algorithms can automatically evolve and optimize sophisticated intrusion detection models, suitable for different applications. In this work, a hybrid evolutionary–fuzzy classification and regression algorithm is used to evolve detectors for several types of intrusions in a wireless sensor network. The ability of genetic programming and differential evolution to construct and optimize intrusion detectors for wireless sensor networks is evaluated on a recent intrusion detection data set capturing malicious activity in a wireless sensor network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Affenzeller, M., Winkler, S., Wagner, S., Beham, A.: Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Application. Chapman & Hall/CRC, Boca Raton (2009)

    Book  Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Almomani, I., Al-Kasasbeh, B., AL-Akhras, M.: WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J. Sensors 2016 (2016). https://doi.org/10.1155/2016/4731953

  4. Batiha, T., Prauzek, M., Krömer, P.: Intrusion detection in wireless sensor networks by an ensemble of artificial neural networks. In: Czarnowski, I., Howlett, R.J., Jain, L.C. (eds.) Intelligent Decision Technologies 2019, pp. 323–333. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8311-3_28

    Chapter  Google Scholar 

  5. Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Boston (2003)

    Google Scholar 

  6. Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, Hoboken (2008)

    Google Scholar 

  7. Cordón, O., Gomide, F., Herrera, F., Hoffmann, F., Magdalena, L.: Ten years of genetic fuzzy systems: current framework and new trends. Fuzzy Sets Syst. 141(1), 5–31 (2004). https://doi.org/10.1016/S0165-0114(03)00111-8

    Article  MathSciNet  MATH  Google Scholar 

  8. Elhag, S., Fernández, A., Alshomrani, S., Herrera, F.: Evolutionary fuzzy systems: a case study for intrusion detection systems, pp. 169–190. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91341-4_9

  9. Fahmy, H.: Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. Signals and Communication Technology. Springer, Singapore (2016)

    Book  Google Scholar 

  10. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 2, p. 10 (2000). https://doi.org/10.1109/HICSS.2000.926982

  11. Islabudeen, M., Kavitha Devi, M.K.: A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wireless Pers. Commun. (2020). https://doi.org/10.1007/s11277-019-07022-5

  12. Krömer, P., Owais, S.S.J., Platos, J., Snásel, V.: Towards new directions of data mining by evolutionary fuzzy rules and symbolic regression. Comput. Math. Appl. 66(2), 190–200 (2013). https://doi.org/10.1016/j.camwa.2013.02.017

    Article  MathSciNet  MATH  Google Scholar 

  13. Krömer, P., Platos, J.: Simultaneous prediction of wind speed and direction by evolutionary fuzzy rule forest. In: International Conference on Computational Science, ICCS 2017, Zurich, Switzerland, 12–14 June 2017, pp. 295–304 (2017)

    Google Scholar 

  14. Kromer, P., Platos, J., Snasel, V., Abraham, A.: Fuzzy classification by evolutionary algorithms. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 313–318 (2011). https://doi.org/10.1109/ICSMC.2011.6083684

  15. Kumar, S., Dutta, K.: Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur. Commun. Netw. 9(14), 2484–2556 (2016). https://doi.org/10.1002/sec.1484

    Article  Google Scholar 

  16. Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security. Springer, New York (2010)

    Google Scholar 

  17. Mrugala, K., Tuptuk, N., Hailes, S.: Evolving attackers against wireless sensor networks using genetic programming. IET Wirel. Sensor Syst. 7(4), 113–122 (2017). https://doi.org/10.1049/iet-wss.2016.0090

    Article  Google Scholar 

  18. Oreku, G., Pazynyuk, T.: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham (2016)

    Book  Google Scholar 

  19. Pasi, G.: Fuzzy sets in information retrieval: state of the art and research trends. In: Bustince, H., Herrera, F., Montero, J. (eds.) Fuzzy Sets and Their Extensions: Representation, Aggregation and Models. Studies in Fuzziness and Soft Computing, vol. 220, pp. 517–535. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Price, K.V., Storn, R.M., Lampinen, J.A.: Differential Evolution: A Practical Approach to Global Optimization. Natural Computing Series. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  21. Qu, H., Lei, L., Tang, X., Wang, P.: A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks. Adv. Fuzzy Syst. 2018 (2018). https://doi.org/10.1155/2018/4071851

  22. Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Netw. 55(15), 3441–3457 (2011). https://doi.org/10.1016/j.comnet.2011.07.001

    Article  Google Scholar 

  23. Stallings, W., Brown, L.: Computer Security: Principles and Practice, 4th edn. Pearson, London (2018). Always Learning

    Google Scholar 

  24. Stehlik, M., Matyas, V., Stetsko, A.: Attack detection using evolutionary computation, pp. 99–129. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-47715-2_5

  25. Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., Li, L.: Wireless sensor networks intrusion detection based on smote and the random forest algorithm. Sensors (Basel, Switzerland) 19(1), 203 (2019). https://doi.org/10.3390/s19010203. PMID 30626020

    Article  Google Scholar 

  26. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6 (2009). https://doi.org/10.1109/CISDA.2009.5356528

  27. Bapuji, V., Manjula, B., Srinivas Reddy, D.: Soft computing technique for intrusion detection system in mobile ad hoc networks. In: Soft Computing in Wireless Sensor Networks, pp. 95–113. Chapman and Hall/CRC, New York (2018). https://doi.org/10.1201/9780429438639

  28. Xue, Y., Jia, W., Zhao, X., Pang, W.: An evolutionary computation based feature selection method for intrusion detection. Secur. Commun. Netw. 2018 (2018). https://doi.org/10.1155/2018/2492956

  29. Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Technology Agency of the Czech Republic in the frame of the project no. TN01000024 “National Competence Center - Cybernetics and Artificial Intelligence”, and by the projects of the Student Grant System no. SP2020/108 and SP2020/161, VSB - Technical University of Ostrava, Czech Republic.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek Batiha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Batiha, T., Krömer, P. (2021). Evolutionary Fuzzy Rules for Intrusion Detection in Wireless Sensor Networks. In: Barolli, L., Li, K., Miwa, H. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2020. Advances in Intelligent Systems and Computing, vol 1263. Springer, Cham. https://doi.org/10.1007/978-3-030-57796-4_15

Download citation

Publish with us

Policies and ethics