Skip to main content
Log in

WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks

  • Original Paper
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) and its applications have gained importance in recent times of research. The heterogeneous nature of IoT networks makes them applicable for various real-time applications and has become inseparable in everyone’s life. Although these IoT devices simplify day to day life activities, these networks are vulnerable to many security threats. Current insufficient security measures make the IoT networks the weakest links for defending the security attacks and, therefore, exciting targets to various attackers. A novel intrusion detection system (IDS) is proposed using powerful deep learning models. Motivated by Long Short Term Memory (LSTM) advantages, whale integrated LSTM (WILS) networks have been proposed to design intelligent IDS to detect the range of different scenarios of threats on IoT networks. The system comprises four essential functions: (i) Data collection unit, which profiles the regular performance of IoT devices connected in the networks, (ii) identifies the malicious devices on the network when an attack is happening, (iii) predicts the type of attacks deployed in the network. The extensive assessments of proposed IDS are done in terms of validation methods and protruding metrics for the various scenarios of IoT threats. The real-time scenario of IoT networks under various attacks has been developed with OMENT-python API, which has been used to analyze the different features of normal malicious nodes in the network. In addition, popular datasets such as CIDDS-001, UNSWNB15, and KDD datasets are used for benchmarking the proposed model. Further, we have employed extensive experiments to evaluate the proposed models and the other existing learning models. The WILS models have outdone the other existing intelligent models in accuracy, precision, and recall, proving their susceptibility for an IoT network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet: the Internet of things architecture, possible applications and key challenges. In Frontiers of Information Technology (FIT), 2012 10th International Conference on, pages 257–260. IEEE

  2. Simon T (2017). Chapter seven: Critical infrastructure and the Internet of things. Cyber Security in a Volatile World, p 93

  3. Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the Internet of things

  4. Cybersecurity executive: Medical devices a' bulls-eye' for cyber-attacks. https://www.digitalhealth.net/2017/12/medical-device-functionality-vs-cybersecurity/. Accessed on 02/05/2018

  5. Anthi E, Javed A, Rana O, Theodorakopoulos G (2017) Secure data sharing and analysis in cloud-based energy management systems. In Cloud Infrastructures, Services, and IoT Systems for Smart Cities, pages 228–242. Springer

  6. Cyber hackers can now harm human life through smart meters — smart grid awareness. https://smartgridawareness.org/2014/12/30/hackers-can-now-harm-human-life/. Accessed on 02/05/2018

  7. Securing the Internet of things: a proposed framework - cisco. https://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html. Accessed on 07/13/2018

  8. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning. arXiv preprint arXiv:1801.06275

  9. Yu T, Sekar V, Seshan S, Agarwal Y, Xu C (2015) Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, page 5. ACM

  10. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of things. Future Gen. Comput. Syst. 82:761–768

    Article  Google Scholar 

  11. Shanthamallu US, Spanias A, Tepedelenlioglu C (2017) "A brief survey of machine learning methods and their sensor and IoT applications", 8th International Conference on Information, Intelligence, Systems & Applications (IISA). https://doi.org/10.1109/IISA.2017.8316459

  12. Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. arXiv preprint arXiv:1804.04159

  13. Shukla P (2017) Ml-ids: a machine learning approach to detect wormhole attacks in Internet of things. In Intelligent Systems Conference (IntelliSys), 2017, pages 234–240. IEEE

  14. Seyhan K, Nguyen TN, Akleylek S, Cengiz K, Islam SH (2021) Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. Journal of Information Security and Applications 58:102788

    Article  Google Scholar 

  15. Verma A, Ranga V (2020) Machine Learning Based Intrusion Detection Systems for IoT Applications. Wireless Personal Communications. https://doi.org/10.1007/s11277-019-06986-8

  16. Misra S, Krishna PV, Agarwal H, Saxena A, Obaidat MS (2011) A learning automata based solution for preventing distributed denial of service in Internet of Things. In IEEE, 4th international conference on cyber, physical and social computing, Internet of Things (ithings/cpscom), pp 114–122

  17. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) Demo: an ids framework for Internet of Things empowered by 6lowpan. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (CCS' 13). ACM, New York, NY, pp 1337–1340

    Google Scholar 

  18. Lee TH, Wen CH, Chang LH, Chiang HS, Hsieh MC (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6lowpan (pp. 1205–1213), Advanced technologies, embedded and multimedia for human-centric computing Dordrecht: Springer

  19. Tama BA, Rhee KH (2019) An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Computing and Applications 31(4):955–965

    Article  Google Scholar 

  20. Primartha R, Tama BA (2017) Anomaly detection using random forest: a performance revisited. In 2017 International conference on data and software engineering (ICoDSE). IEEE, pp 1–6

  21. Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2019) A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences https://doi.org/10.1016/j.ins.2019.10.069

  22. Krawczyk B, Minku LL, Gama J, Stefanowski J, Woźniak M (2017) Ensemble learning for data stream analysis: a survey. Information Fusion 37:132–156

    Article  Google Scholar 

  23. Apthorpe N, Reisman D, Feamster N (2016) A smart home is no castle: privacy vulnerabilities of encrypted iot traffic

  24. Pongle P, Chavan G (2015) Real time intrusion and wormhole attack detection in Internet of things. Int J Comput Appl 121(9):0975–8887

  25. Sherasiya T, Upadhyay H Intrusion detection system for Internet of things. International Journal of Advance Research and Innovative Ideas in Education 2(3)

  26. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013). Denial-of-service detection in 6lowpan based Internet of things. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, pages 600–607. IEEE

  27. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: Security vulnerabilities and challenges. In Computers and Communication (ISCC), 2015 IEEE Symposium on, pages 180–187. IEEE

  28. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84

    Article  Google Scholar 

  29. Pahl M-O, Aubet F-X (2018) All eyes on you: distributed multi-dimensional IoT microservice anomalydetection, in: Proceedings of the 2018 Fourteenth International Conference on Network and Service Management (CNSM)(CNSM 2018), Rome, Italy

  30. Poyner I, Sherratt R (2018), Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people

  31. Mukherjee A, Chakraborty N, Das BK "Whale optimization algorithm: an implementation to design low-pass FIR filter", 2017 Innovations in Power and Advanced Computing Technologies (i-PACT)

  32. Supreetha BS, Shenoy N, Nayak P (2020) "Lion algorithm-optimized long short-term memory network for groundwater level forecasting in Udupi District, India", Applied Computational Intelligence and Soft Computing Volume 2020, Article ID 8685724, 8 pages. https://doi.org/10.1155/2020/8685724

  33. CIDDS-001 dataset (2017) Retrieved November 3, 2019, from https://www.hs-coburg.de/forschungkooperation/forschungsprojekte-fentlich/ingenieurwissenschaften/cidds-coburg-intrusion-detectiondata-sets.html.

  34. NSL-KDD dataset (2017) Retrieved November 3, 2019, from http://nsl.cs.unb.ca/nsl-kdd/

  35. UNSW-NB15 dataset Retrieved November 3, 2019, from https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/

  36. Roy B, Cheung H (2018) A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Networks, IEEE, International telecommunication conference.

  37. Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. https://doi.org/10.1016/j.ins.2019.10.069

  38. Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the Internet of Things. Inf Sci 396:72–82

    Article  Google Scholar 

  39. Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495

    Article  Google Scholar 

  40. Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the Internet of Things: a context-aware and multi-service approach. Computer Security 39:351–365

    Article  Google Scholar 

  41. Ko HG, Ko IY, Lee D (2018) Multi-criteria matrix localization and integration for personalized collaborative filtering in IoT environments. Multimedia Tools Appl 77(4):4697–4730

    Article  Google Scholar 

  42. Chen JM, Li T, Panneerselvam J. (2018) TMEC: a trust management based on evidence combination on attack resistant and collaborative Internet of vehicles. IEEE Access

  43. Asiri S, Miri A (2016) An IoT trust and reputation model based on recommender systems. In: 14th annual conference on privacy, security and trust (PST), 2016. IEEE, Piscataway, pp 561–568

  44. Mahmud M, Kaiser MS, Rahman MM, Rahman MA, Shabut A, Al-Mamun S, Hussain A (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10(5):864–873

    Article  Google Scholar 

  45. Zeinali Y, Story BA (2017) Competitive probabilistic neural network. Integr Comput Aided Eng 24(2):105–1180

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Jothi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jothi, B., Pushpalatha, M. WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks. Pers Ubiquit Comput 27, 1285–1301 (2023). https://doi.org/10.1007/s00779-021-01578-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-021-01578-5

Keywords

Navigation