International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques

Author NameAuthor Details

Trifa Sherko Othman, Saman Mirza Abdullah

Trifa Sherko Othman[1]

Saman Mirza Abdullah[2]

[1]Department of Software Engineering, Koya University, University Park, Danielle Mitterrand Boulevard, Koya KOY45, Kurdistan Region, Iraq

[2]Department of Software Engineering, Koya University, University Park, Danielle Mitterrand Boulevard, Koya KOY45, Kurdistan Region, Iraq

Abstract

The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.

Index Terms

IoT Networks

Intrusion Detection

IDS

IoT Attack

Machine Learning

Attack Detection

Reference

  1. 1.
    Nagisetty, A. and G.P. Gupta. Framework for detection of malicious activities in IoT networks using keras deep learning library. in 2019 3rd international conference on computing methodologies and communication (ICCMC). 2019. IEEE.
  2. 2.
    Malik, M. and M. Dutta, Security Challenges in Internet of Things (IoT) Integrated Power and Energy (PaE) Systems. Intelligent Data Analytics for Power and Energy Systems, 2022: p. 555-566.
  3. 3.
    Ho, E.S., Data Security Challenges in Deep Neural Network for Healthcare IoT Systems, in Security and Privacy Preserving for IoT and 5G Networks. 2022, Springer. p. 19-37.
  4. 4.
    Nawir, M., et al. Internet of Things (IoT): Taxonomy of security attacks. in 2016 3rd international conference on electronic design (ICED). 2016. IEEE.
  5. 5.
    Chen, K., et al., Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security, 2018. 2(2): p. 97-110.
  6. 6.
    Saharkhizan, M., et al., An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal, 2020. 7(9): p. 8852-8859.
  7. 7.
    Radivilova, T., et al. Classification methods of machine learning to detect DDoS attacks. in 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2019. IEEE.
  8. 8.
    Sanmorino, A. A study for DDOS attack classification method. in Journal of Physics: Conference Series. 2019. IOP Publishing.
  9. 9.
    Parmisano, A., S. Garcia, and M. Erquiaga, Aposemat IoT-23: A labeled dataset with malicious and benign IoT network traffic. Accessed: Jul, 2020. 31: p. 2020.
  10. 10.
    Giusto, D., et al., The internet of things: 20th Tyrrhenian workshop on digital communications. 2010: Springer Science & Business Media.
  11. 11.
    Kareem, M.I. and M.N. Jasim, Fast and accurate classifying model for denial-of-service attacks by using machine learning. Bulletin of Electrical Engineering and Informatics, 2022. 11(3): p. 1742-1751.
  12. 12.
    Kumari, K. and M. Mrunalini, Detecting Denial of Service attacks using machine learning algorithms. Journal of Big Data, 2022. 9(1): p. 1-17.
  13. 13.
    Li, Z., A.L.G. Rios, and L. Trajkovi?. Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms. in 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). 2021. IEEE.
  14. 14.
    Tabassum, A., et al., FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning. Computer Communications, 2022. 192: p. 299-310.
  15. 15.
    Tabassum, A., et al., Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems. IEEE Access, 2021. 9: p. 14271-14283.
  16. 16.
    PICON RUIZ, A., et al., Why deep learning performs better than classical machine learning? Dyna Ingenieria E Industria, 2020.
  17. 17.
    Sewak, M., S.K. Sahay, and H. Rathore. Comparison of deep learning and the classical machine learning algorithm for the malware detection. in 2018 19th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). 2018. IEEE.
  18. 18.
    Soe, Y.N., et al. A sequential scheme for detecting cyber attacks in IoT environment. in 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). 2019. IEEE.
  19. 19.
    Hanif, S., T. Ilyas, and M. Zeeshan. Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. in 2019 IEEE 16th international conference on smart cities: improving quality of life using ICT & IoT and AI (HONET-ICT). 2019. IEEE.
  20. 20.
    Fatayer, T.S. and M.N. Azara. IoT secure communication using ANN classification algorithms. in 2019 International Conference on Promising Electronic Technologies (ICPET). 2019. IEEE.
  21. 21.
    Gopi, R., et al., Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimedia Tools and Applications, 2021: p. 1-19.
  22. 22.
    Churcher, A., et al., An experimental analysis of attack classification using machine learning in IoT networks. Sensors, 2021. 21(2): p. 446.
  23. 23.
    Mehmood, A., A.N. Khan, and M. Elhadef, HeuCrip: a malware detection approach for internet of battlefield things. Cluster Computing, 2022: p. 1-16.
  24. 24.
    Li, W., et al., A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014. 2014.
  25. 25.
    Iman, A.I.N., LOW RATE DDOS ATTACK DETECTION USING KNN ON SD-IOT. 2022, Universitas Muhammadiyah Malang.
  26. 26.
    Alfarshouti, A.M. and S.M. Almutairi, An Intrusion Detection System in IoT Environment Using KNN and SVM Classifiers. Webology, 2022. 19(1).
  27. 27.
    27. Islam, U., et al., Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models. Sustainability, 2022. 14(14): p. 8374.
  28. 28.
    Aslam, M., et al., Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors, 2022. 22(7): p. 2697.
  29. 29.
    majeed Alhammadi, N.A., Comparative study between (SVM) and (KNN) classifiers by using (PCA) to improve of intrusion detection system. Iraqi Journal of Intelligent Computing and Informatics (IJICI), 2022. 1(1): p. 22-33.
  30. 30.
    Garcia, S., A. Parmisano, and M.J. Erquiaga, IoT-23: A labeled dataset with malicious and benign IoT network traffic. Stratosphere Lab., Praha, Czech Republic, Tech. Rep, 2020.
  31. 31.
    Lee, S.-J. and X. Zeng. A modular method for estimating null values in relational database systems. in 2008 Eighth International Conference on Intelligent Systems Design and Applications. 2008. IEEE.
  32. 32.
    Abdulla, S.M., N.B. Al-Dabagh, and O. Zakaria, Identify features and parameters to devise an accurate intrusion detection system using artificial neural network. International Journal of Computer and Information Engineering, 2010. 4(10): p. 1553-1557.
  33. 33.
    Weller-Fahy, D.J., B.J. Borghetti, and A.A. Sodemann, A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Communications Surveys & Tutorials, 2014. 17(1): p. 70-91.
  34. 34.
    Bhandari, A. Everything you Should Know about Confusion Matrix for Machine Learning. April 17, 2020 June 14th, 2022 August 26, 2022]; Available from: https://www.analyticsvidhya.com/blog/2020/04/confusion-matrix-machine-learning/#:~:text=A%20Confusion%20matrix%20is%20an,by%20the%20machine%20learning%20model.
SCOPUS
SCImago Journal & Country Rank