Abstract
This research paper is focused on security in IoT devices network, by providing a visual tool based on Beta Hebbian Learning (BHL) to easily identify attacks in the network to human experts. Contrary to Artificial Intelligent-driven solutions based on supervised learning BHL does not require labelled information. A testing environment of IoT devices and web clients is created and attack by using a Sybil Attack type, recording all traffic information in separating the fields of the captures by the most relevant, these fields are taken from “Wireshark Display Filter Reference” tool. Results obtained by BHL algorithm provide clear projections where most of the attacks can be easily identified by human expert through visual inspection in real time, proving a powerful tool to be easily implemented in IoT environments.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juniper research: IoT platform revenue to grow 20% in 2020, despite global covid-19 pandemic (2020). https://www.juniperresearch.com/press/press-releases/iot-platform-revenue-to-grow20-in-2020
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017). https://doi.org/10.1109/EECSI.2017.8239179
Aveleira-mata, J., et al.: Prototipo de ids para detección de intrusiones con modelos de machine learning en sistemas IoT de la industria 4.0 ids prototype for intrusion detection with machine learning models in IoT systems of the industry 4.0. Dyna 96, 1–11 (2021)
Berro, A., Larabi Marie-Sainte, S., Ruiz-Gazen, A.: Genetic algorithms and particle swarm optimization for exploratory projection pursuit. Ann. Math. Artif. Intell. 60, 153–178 (2010). https://doi.org/10.1007/s10472-010-9211-0
Corchado, E., Fyfe, C.: Connectionist techniques for the identification and suppression of interfering underlying factors. IJPRAI 17, 1447–1466 (2003). https://doi.org/10.1142/S0218001403002915
Crespo-Turrado, C., et al.: Comparative study of imputation algorithms applied to the prediction of student performance. Log. J. IGPL 28(1), 58–70 (2020)
Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37. IEEE (2017)
García-Ordás, M.T., Aveleira-Mata, J., Casteleiro-Roca, J.-L., Calvo-Rolle, J.L., Benavides-Cuellar, C., Alaiz-Moretón, H.: Autoencoder latent space influence on IoT MQTT attack classification. In: Analide, C., Novais, P., Camacho, D., Yin, H. (eds.) IDEAL 2020. LNCS, vol. 12490, pp. 279–286. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-62365-4_27
Jove, E., Casteleiro-Roca, J., Quintián, H., Méndez-Pérez, J., Calvo-Rolle, J.: Anomaly detection based on intelligent techniques over a bicomponent production plant used on wind generator blades manufacturing. Rev. Iberoamericana Autom. Inform. Ind. 17(1), 84–93 (2020)
Jove, E., et al.: Missing data imputation over academic records of electrical engineering students. Log. J. IGPL 28(4), 487–501 (2020)
Jove, E., et al.: Modelling the hypnotic patient response in general anaesthesia using intelligent models. Log. J. IGPL 27(2), 189–201 (2019)
Kant, D., Johannsen, A., Creutzburg, R.: Analysis of IoT security risks based on the exposure of the MQTT protocol. IEEE Access 3(6), 1–8 (2021)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Luis Casteleiro-Roca, J., Quintián, H., Luis Calvo-Rolle, J., Méndez-Pérez, J.A., Javier Perez-Castelo, F., Corchado, E.: Lithium iron phosphate power cell fault detection system based on hybrid intelligent system. Log. J. IGPL 28(1), 71–82 (2020)
Magán-Carrión, R., Urda, D., Díaz-Cano, I., Dorronsoro, B.: Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Appl. Sci. 10(5), 1775 (2020)
Quintián, H., Corchado, E.: Beta hebbian learning as a new method for exploratory projection pursuit. Int. J. Neural Syst. 27(6), 1–16 (2017). https://doi.org/10.1142/S0129065717500241
Quintián, H., et al.: Beta-hebbian learning for visualizing intrusions in flows. In: Herrero, Álvaro., Cambra, Carlos, Urda, Daniel, Sedano, Javier, Quintián, Héctor., Corchado, Emilio (eds.) CISIS 2019. AISC, vol. 1267, pp. 446–459. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-57805-3_42
Sánchez, R., Herrero, Á., Corchado, E.: Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data. Log. J. IGPL 25(1), 83–102 (2017). https://doi.org/10.1093/jigpal/jzw047
Sedano, J., González, S., Chira, C., Herrero, Á., Corchado, E., Villar, J.R.: Key features for the characterization of android malware families. Log. J. IGPL 25(1), 54–66 (2017). https://doi.org/10.1093/jigpal/jzw046
Singh, R.P., Javaid, M., Haleem, A., Suman, R.: Internet of things (IoT) applications to fight against COVID-19 pandemic. Diabetes Metab. Syndr.: Clin. Res. Rev. 14(4), 521–524 (2020)
Umair, M., Cheema, M., Cheema, O., Li, H., Lu, H.: Impact of COVID-19 on IoT adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT (2021)
Vega, R.V., Quintián, H., Calvo-Rolle, J.L., Herrero, Á., Corchado, E.: Gaining deep knowledge of android malware families through dimensionality reduction techniques. Log. J. IGPL 27(2), 160–176 (2019). https://doi.org/10.1093/jigpal/jzy030
Acknowledgements
CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).
Spanish National Cybersecurity Institute (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Grandío, Á.M. et al. (2022). Beta Hebbian Learning for Intrusion Detection in Networks of IoT Devices. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-87872-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87871-9
Online ISBN: 978-3-030-87872-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)