Stacked-RFNet: Intelligent fusion model for detecting jamming-based DoS and DDoS attacks in wireless sensor networks


Abstract

The modern community increasingly depends more than ever on a variety of platforms for data exchange and communication due to the ongoing rapid evolution and development of the internet and computing technologies. These frameworks offer autonomy and accuracy but tend to lack advanced security and safety measures, consisting of valuable data, which cybercriminals have taken new ways to take advantage of by developing potential techniques for compromising security and breaching data. By using malicious software, viruses, jamming attacks, and injection attacks, etc., in several IoT and WSN frameworks in use by both residential and commercial sectors, cybercriminals are making it a major concern for stakeholders and potential users. Based on these issues, the proposed methodology is designed using advanced Machine Learning techniques for detecting jamming attacks within a WSN. The methodology uses 2 distinct datasets taken from Kaggle, first the “CICIot2023 dataset” that consists of 6 classes associated with DDoS attacks, and the “DOS Mosaic dataset” which consists of 3 classes associated with DoS attacks. An extensive exploratory data analysis (EDA) technique is applied to both datasets to extract data limitations, which were later improved by applying data preprocessing and feature extraction techniques for data enhancement and feature selection. For model training, the proposed model RFMetaClassifier is presented, which is an ensemble stacked model developed using Multilayer perceptron, Random Forest, and Logistic Regression within the base layer and Random Forest model as the Meta Layer. Furthermore, 6 ML classifiers, including Decision Tree, Random Forest, XGboost, Logistic Regression, Naive Bayes, and Catboost, along with 3 Hybrid models CNN+GRU, CNN+Random Forest, and CNN+Decision Tree, are applied on both of the datasets. The aim was to implement a series of different models alongside the proposed RFMetaClassifier for a more detailed performance comparison. Out of these implemented algorithms, RFMetaClassifier produced the best results on both datasets based on selected performance evaluation metrics. The proposed model produced 100% of training and 100% of validation accuracy on the ‘DoS Mosaic Dataset’ as well as 100% and 99.98% of training and validation accuracy, respectively, on the “CICIoT2023 dataset”. The proposed methodology surpasses the ML and hybrid techniques utilized within the existing related work by producing the highest accuracy among all. This work can substantially prove to be very helpful in the detection and classification of jamming attacks in various industrial sectors, as well as for domestic use.
Ask to review this manuscript

Notes for potential reviewers

  • Volunteering is not a guarantee that you will be asked to review. There are many reasons: reviewers must be qualified, there should be no conflicts of interest, a minimum of two reviewers have already accepted an invitation, etc.
  • This is NOT OPEN peer review. The review is single-blind, and all recommendations are sent privately to the Academic Editor handling the manuscript. All reviews are published and reviewers can choose to sign their reviews.
  • What happens after volunteering? It may be a few days before you receive an invitation to review with further instructions. You will need to accept the invitation to then become an official referee for the manuscript. If you do not receive an invitation it is for one of many possible reasons as noted above.

  • PeerJ Computer Science does not judge submissions based on subjective measures such as novelty, impact or degree of advance. Effectively, reviewers are asked to comment on whether or not the submission is scientifically and technically sound and therefore deserves to join the scientific literature. Our Peer Review criteria can be found on the "Editorial Criteria" page - reviewers are specifically asked to comment on 3 broad areas: "Basic Reporting", "Experimental Design" and "Validity of the Findings".
  • Reviewers are expected to comment in a timely, professional, and constructive manner.
  • Until the article is published, reviewers must regard all information relating to the submission as strictly confidential.
  • When submitting a review, reviewers are given the option to "sign" their review (i.e. to associate their name with their comments). Otherwise, all review comments remain anonymous.
  • All reviews of published articles are published. This includes manuscript files, peer review comments, author rebuttals and revised materials.
  • Each time a decision is made by the Academic Editor, each reviewer will receive a copy of the Decision Letter (which will include the comments of all reviewers).

If you have any questions about submitting your review, please email us at [email protected].