IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



IDBSCAN Algorithm Based Proficient Anomaly Detection

[Full Text]

 

AUTHOR(S)

Nooh Bany Muhammad

 

KEYWORDS

WNS, Density-Based Spatial Clustering of Applications with Noise, Intel Berkeley Research lab, Kruskal Algorithm, Intrusion detection

 

ABSTRACT

In Wireless Sensor Networks, anomaly is considered as most impact component because the data integrity is affected by anomaly. This causes uncontrolled network on Wireless Sensors. This research work handles the detection of anomaly effectively. Initially this work considers most essential features among vast number of features from bench mark dataset Intel Berkeley Research lab (IRLB). Those features are temperature, voltage and humidity. From the network traffic, aforementioned features are extracted. The data of network are clustering by using Improved Density-Based Spatial Clustering of Applications with Noise (IDBSCAN) algorithm. The anomaly is detected by varying the portions based on density, where the low density regions are considered as anomaly data. Probabilistic neural network is trained by using normal data which is clustered in high- density portions. The novel of this proposed IDBSCAN algorithm is Minimum spanning tree is evaluated by using Improved Kruskal Algorithm (IKA). Thus the anomaly is found effectively and security of network is improved.

 

REFERENCES

[1] M. Dong, K. Ota, and A. Liu, "RMER: Reliable and energy-efficient data collection for large-scale wireless sensor networks," IEEE Internet of Things Journal, vol. 3, pp. 511-519, 2016.
[2] H. M. A. Fahmy, "WSNs applications," in Wireless Sensor Networks, ed: Springer, 2016, pp. 69-213.
[3] A. Bouguettaya, Q. Yu, X. Liu, X. Zhou, and A. Song, "Efficient agglomerative hierarchical clustering," Expert Systems with Applications, vol. 42, pp. 2785-2797, 2015.
[4] A. Bryant and K. Cios, "RNN-DBSCAN: A density-based clustering algorithm using reverse nearest neighbor density estimates," IEEE Transactions on Knowledge and Data Engineering, vol. 30, pp. 1109-1121, 2018.
[5] J. Hou, H. Gao, and X. Li, "DSets-DBSCAN: a parameter-free clustering algorithm," IEEE Transactions on Image Processing, vol. 25, pp. 3182-3193, 2016.
[6] M. Xie, J. Hu, and S. Guo, "Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 574-583, 2015.
[7] E. Hoque, R. F. Dickerson, S. M. Preum, M. Hanson, A. Barth, and J. A. Stankovic, "Holmes: A comprehensive anomaly detection system for daily in-home activities," in 2015 International Conference on Distributed Computing in Sensor Systems, 2015, pp. 40-51.
[8] A. Abid, A. Kachouri, and A. Mahfoudhi, "Outlier detection for wireless sensor networks using density-based clustering approach," IET Wireless Sensor Systems, vol. 7, pp. 83-90, 2017.
[9] H. Ozkan, F. Ozkan, and S. S. Kozat, "Online anomaly detection under Markov statistics with controllable type-I error," IEEE Transactions on Signal Processing, vol. 64, pp. 1435-1445, 2016.
[10] N. Chitradevi, V. Palanisamy, K. Baskaran, and K. Swathithya, "Efficient density based techniques for anomalous data detection in wireless sensor networks," 淡江理工學刊, vol. 16, pp. 211-223, 2013.
[11] J. Shen, X. Hao, Z. Liang, Y. Liu, W. Wang, and L. Shao, "Real-time superpixel segmentation by DBSCAN clustering algorithm," IEEE Transactions on Image Processing, vol. 25, pp. 5933-5942, 2016.
[12] M. Zolotukhin, T. Hämäläinen, T. Kokkonen, and J. Siltanen, "Analysis of http requests for anomaly detection of web attacks," in 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, 2014, pp. 406-411.
[13] D. Juliette, R. Gilles, and O. Philippe, "Online and Scalable Unsupervised Network Anomaly Detection Method," IEEE Transactions on Network and Service Management, pp. 1-15, 2016.
[14] A. Karami and R. Johansson, "Choosing dbscan parameters automatically using differential evolution," International Journal of Computer Applications, vol. 91, pp. 1-11, 2014.
[15] F. Kuang, W. Xu, and S. Zhang, "A novel hybrid KPCA and SVM with GA model for intrusion detection," Applied Soft Computing, vol. 18, pp. 178-184, 2014.
[16] S. Manaseer, A. Alawneh, and H. Almogdady, "SOCIAL MEDIA AS A TOOL IN EDUCATION: A CONTENT DESCRIPTIVE ANALYSIS," International Journal of Information, Business and Management, vol. 11, pp. 212-218, 2019.
[17] S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, "High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning," Pattern Recognition, vol. 58, pp. 121-134, 2016.
[18] O. Salem, A. Guerassimov, A. Mehaoua, A. Marcus, and B. Furht, "Anomaly detection in medical wireless sensor networks using SVM and linear regression models," International Journal of E-Health and Medical Communications (IJEHMC), vol. 5, pp. 20-45, 2014.
[19] S. Agrawal and J. Agrawal, "Survey on anomaly detection using data mining techniques," Procedia Computer Science, vol. 60, pp. 708-713, 2015.
[20] "http://db.csail.mit.edu/labdata/labdata.html.."
[21] T. Zhang, Q. Zhao, K. Shin, and Y. Nakamoto, "Bayesian-Optimization-Based Peak Searching Algorithm for Clustering in Wireless Sensor Networks," Journal of Sensor and Actuator Networks, vol. 7, p. 2, 2018.