Hybrid Intrusion Detection System for Internet of Things (IoT)
PDF

How to Cite

Smys, S., Abul Basar, and Haoxiang Wang. 2020. “Hybrid Intrusion Detection System for Internet of Things (IoT)”. Journal of ISMAC 2 (4): 190-99. https://doi.org/10.36548/jismac.2020.4.002.

Keywords

— Intrusion detection system (IDS)
— Internet of Things (IoT)
— Network attacks
Published: 30-09-2020

Abstract

Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity. Since IoT drive the world and changes people lives with its wide range of services and applications. However, IoT provides numerous services through applications, it faces severe security issues and vulnerable to attacks such as sinkhole attack, eaves dropping, denial of service attacks, etc., Intrusion detection system is used to detect such attacks when the network security is breached. This research work proposed an intrusion detection system for IoT network and detect different types of attacks based on hybrid convolutional neural network model. Proposed model is suitable for wide range of IoT applications. Proposed research work is validated and compared with conventional machine learning and deep learning model. Experimental result demonstrate that proposed hybrid model is more sensitive to attacks in the IoT network.

References

  1. Snehal Deshmukh-Bhosale, Santosh S. Sonavane (2019). A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things. Procedia Manufacturing. 32:840-847.
  2. Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita (2019). Active learning to detect DDoS attack using ranked features. Computer Communications. 145:209-222
  3. Shailendra Rathore, Jong Hyuk Park (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing. 72:79-89.
  4. Alekha Kumar Mishra, Asis Kumar Tripathy, Deepak Puthal, Laurence T. Yang (2019). Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet of Things Journal. 6(1): 379-387.
  5. Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu, Jaime Lloret (2015). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, 58(6): 1280-1292,
  6. Yuxin Liu, Ming Ma, Xiao Liu, Neal N. Xiong, Anfeng Liu, Ying Zhu (2020). Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security. IEEE Transactions on Network Science and Engineering. 7(1): 356-372.
  7. Bin Xu, Weike Wang, Qiang Hao,Zhun Zhang, Pei Du, Tongsheng Xia,Hongge Li, Xiang Wang (2018). A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device. IEEE Access. 6: 72862-72869.
  8. Chen Lyu, Xiaomei Zhang, Zhiqiang Liu, Chi-Hung Chi (2019). Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks. IEEE Access. 7: 31068-31082.
  9. Mahmudul Hasan, Md. Milon Islam, Md Ishrak Islam Zarif, M. M. A. Hashem (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things. 7: 1-16.
  10. Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Shen (2016). Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks. IEEE Transactions on Wireless Communications. 15(5): 3718-3731.
  11. Noshina Tariq, Muhammad Asim, Zakaria Maamar, M. Zubair Farooqi, Thar Baker (2019). A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT. Journal of Parallel and Distributed Computing.134:198-206.
  12. Thi Ngoc Diep Pham, Chai Kiat Yeo, Naoto Yanai, Toru Fujiwara (2018). Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks. IEEE Transactions on Vehicular Technology. 67 (1): 795-808.
  13. Bo Chen, Daniel W. C. Ho, Guoqiang Hu, Li Yu(2018). Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks. IEEE Transactions on Cybernetics. 48(6): 1862-1876
  14. Olivier Brun, Yonghua Yin, Erol Gelenbe (2018). Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments. Procedia Computer Science. 134:458-463.
  15. Haythem A. Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala (2018). Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks. IEEE Internet of Things Journal. 5(3): 1904-1913