Abstract
Internet of Things (IoT) and its applications have gained importance in recent times of research. The heterogeneous nature of IoT networks makes them applicable for various real-time applications and has become inseparable in everyone’s life. Although these IoT devices simplify day to day life activities, these networks are vulnerable to many security threats. Current insufficient security measures make the IoT networks the weakest links for defending the security attacks and, therefore, exciting targets to various attackers. A novel intrusion detection system (IDS) is proposed using powerful deep learning models. Motivated by Long Short Term Memory (LSTM) advantages, whale integrated LSTM (WILS) networks have been proposed to design intelligent IDS to detect the range of different scenarios of threats on IoT networks. The system comprises four essential functions: (i) Data collection unit, which profiles the regular performance of IoT devices connected in the networks, (ii) identifies the malicious devices on the network when an attack is happening, (iii) predicts the type of attacks deployed in the network. The extensive assessments of proposed IDS are done in terms of validation methods and protruding metrics for the various scenarios of IoT threats. The real-time scenario of IoT networks under various attacks has been developed with OMENT-python API, which has been used to analyze the different features of normal malicious nodes in the network. In addition, popular datasets such as CIDDS-001, UNSWNB15, and KDD datasets are used for benchmarking the proposed model. Further, we have employed extensive experiments to evaluate the proposed models and the other existing learning models. The WILS models have outdone the other existing intelligent models in accuracy, precision, and recall, proving their susceptibility for an IoT network.
Similar content being viewed by others
References
Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet: the Internet of things architecture, possible applications and key challenges. In Frontiers of Information Technology (FIT), 2012 10th International Conference on, pages 257–260. IEEE
Simon T (2017). Chapter seven: Critical infrastructure and the Internet of things. Cyber Security in a Volatile World, p 93
Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the Internet of things
Cybersecurity executive: Medical devices a' bulls-eye' for cyber-attacks. https://www.digitalhealth.net/2017/12/medical-device-functionality-vs-cybersecurity/. Accessed on 02/05/2018
Anthi E, Javed A, Rana O, Theodorakopoulos G (2017) Secure data sharing and analysis in cloud-based energy management systems. In Cloud Infrastructures, Services, and IoT Systems for Smart Cities, pages 228–242. Springer
Cyber hackers can now harm human life through smart meters — smart grid awareness. https://smartgridawareness.org/2014/12/30/hackers-can-now-harm-human-life/. Accessed on 02/05/2018
Securing the Internet of things: a proposed framework - cisco. https://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html. Accessed on 07/13/2018
Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning. arXiv preprint arXiv:1801.06275
Yu T, Sekar V, Seshan S, Agarwal Y, Xu C (2015) Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, page 5. ACM
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of things. Future Gen. Comput. Syst. 82:761–768
Shanthamallu US, Spanias A, Tepedelenlioglu C (2017) "A brief survey of machine learning methods and their sensor and IoT applications", 8th International Conference on Information, Intelligence, Systems & Applications (IISA). https://doi.org/10.1109/IISA.2017.8316459
Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. arXiv preprint arXiv:1804.04159
Shukla P (2017) Ml-ids: a machine learning approach to detect wormhole attacks in Internet of things. In Intelligent Systems Conference (IntelliSys), 2017, pages 234–240. IEEE
Seyhan K, Nguyen TN, Akleylek S, Cengiz K, Islam SH (2021) Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. Journal of Information Security and Applications 58:102788
Verma A, Ranga V (2020) Machine Learning Based Intrusion Detection Systems for IoT Applications. Wireless Personal Communications. https://doi.org/10.1007/s11277-019-06986-8
Misra S, Krishna PV, Agarwal H, Saxena A, Obaidat MS (2011) A learning automata based solution for preventing distributed denial of service in Internet of Things. In IEEE, 4th international conference on cyber, physical and social computing, Internet of Things (ithings/cpscom), pp 114–122
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) Demo: an ids framework for Internet of Things empowered by 6lowpan. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (CCS' 13). ACM, New York, NY, pp 1337–1340
Lee TH, Wen CH, Chang LH, Chiang HS, Hsieh MC (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6lowpan (pp. 1205–1213), Advanced technologies, embedded and multimedia for human-centric computing Dordrecht: Springer
Tama BA, Rhee KH (2019) An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Computing and Applications 31(4):955–965
Primartha R, Tama BA (2017) Anomaly detection using random forest: a performance revisited. In 2017 International conference on data and software engineering (ICoDSE). IEEE, pp 1–6
Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2019) A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences https://doi.org/10.1016/j.ins.2019.10.069
Krawczyk B, Minku LL, Gama J, Stefanowski J, Woźniak M (2017) Ensemble learning for data stream analysis: a survey. Information Fusion 37:132–156
Apthorpe N, Reisman D, Feamster N (2016) A smart home is no castle: privacy vulnerabilities of encrypted iot traffic
Pongle P, Chavan G (2015) Real time intrusion and wormhole attack detection in Internet of things. Int J Comput Appl 121(9):0975–8887
Sherasiya T, Upadhyay H Intrusion detection system for Internet of things. International Journal of Advance Research and Innovative Ideas in Education 2(3)
Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013). Denial-of-service detection in 6lowpan based Internet of things. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, pages 600–607. IEEE
Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: Security vulnerabilities and challenges. In Computers and Communication (ISCC), 2015 IEEE Symposium on, pages 180–187. IEEE
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84
Pahl M-O, Aubet F-X (2018) All eyes on you: distributed multi-dimensional IoT microservice anomalydetection, in: Proceedings of the 2018 Fourteenth International Conference on Network and Service Management (CNSM)(CNSM 2018), Rome, Italy
Poyner I, Sherratt R (2018), Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people
Mukherjee A, Chakraborty N, Das BK "Whale optimization algorithm: an implementation to design low-pass FIR filter", 2017 Innovations in Power and Advanced Computing Technologies (i-PACT)
Supreetha BS, Shenoy N, Nayak P (2020) "Lion algorithm-optimized long short-term memory network for groundwater level forecasting in Udupi District, India", Applied Computational Intelligence and Soft Computing Volume 2020, Article ID 8685724, 8 pages. https://doi.org/10.1155/2020/8685724
CIDDS-001 dataset (2017) Retrieved November 3, 2019, from https://www.hs-coburg.de/forschungkooperation/forschungsprojekte-fentlich/ingenieurwissenschaften/cidds-coburg-intrusion-detectiondata-sets.html.
NSL-KDD dataset (2017) Retrieved November 3, 2019, from http://nsl.cs.unb.ca/nsl-kdd/
UNSW-NB15 dataset Retrieved November 3, 2019, from https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/
Roy B, Cheung H (2018) A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Networks, IEEE, International telecommunication conference.
Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. https://doi.org/10.1016/j.ins.2019.10.069
Fernandez-Gago C, Moyano F, Lopez J (2017) Modelling trust dynamics in the Internet of Things. Inf Sci 396:72–82
Chen R, Guo J, Bao F (2016) Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput 9(3):482–495
Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the Internet of Things: a context-aware and multi-service approach. Computer Security 39:351–365
Ko HG, Ko IY, Lee D (2018) Multi-criteria matrix localization and integration for personalized collaborative filtering in IoT environments. Multimedia Tools Appl 77(4):4697–4730
Chen JM, Li T, Panneerselvam J. (2018) TMEC: a trust management based on evidence combination on attack resistant and collaborative Internet of vehicles. IEEE Access
Asiri S, Miri A (2016) An IoT trust and reputation model based on recommender systems. In: 14th annual conference on privacy, security and trust (PST), 2016. IEEE, Piscataway, pp 561–568
Mahmud M, Kaiser MS, Rahman MM, Rahman MA, Shabut A, Al-Mamun S, Hussain A (2018) A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognit Comput 10(5):864–873
Zeinali Y, Story BA (2017) Competitive probabilistic neural network. Integr Comput Aided Eng 24(2):105–1180
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jothi, B., Pushpalatha, M. WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks. Pers Ubiquit Comput 27, 1285–1301 (2023). https://doi.org/10.1007/s00779-021-01578-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-021-01578-5