Skip to main content
Log in

Network Based Detection of IoT Attack Using AIS-IDS Model

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent days Internet of Things attained more familiarity. Although it is a promising technology, it tends to lead to a variety of security issues. Conventional methods such as IoT ecosystem based solutions were not suitable to give dilemmas to the system. A new system model called adaptive and intelligent Artificial Immune System (AIS) imitates the process of human being an immune system that consists of eligible properties of this varying environment. Therefore, it enhanced IoT security. Conventionally classifiers such as Random Forest Classifier, Recurrent Neural Network and K-nearest neighbours are used to classify the signals as normal or abnormal and predict malicious attacks. But unfortunately, these classifiers generated a high false alarm rate. Thus, a framework with maximum accuracy and minimum false alarm rate was required. In this work, the AIS model adopts the benefits of the Hopfield Neural Network (HNN) for classification. HNN classifier has a fixed weight, as it cannot be changed for its backpropagation property. This work optimally selects the fixed weight using Fast- Particle Swarm Optimization (F-PSO) and helps to enhance the accuracy of the HNN classifier. This classifier model then differentiates IoT attacks with a high detection rate and normal signal. Three datasets are taken to execute the proposed model and define its accuracy. The proposed Artificial Immune system using HNN for Intrusion Detection System (AIS-IDS) model exhibits 99.8% accuracy for the first dataset and minimum error value. The false alarm rate was minimized using danger theory and its high activation function; thus, the false alarm rate was minimized by up to 8% more than previous classifiers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability statement

There is no availability of data or materials available or report for the manuscript.

Code availability

No code is available for this manuscript.

References

  1. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287–2310.

    Article  Google Scholar 

  2. Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625.

    Article  Google Scholar 

  3. Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

    Article  Google Scholar 

  4. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M. and Kumar, D. (2017) Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security, 17:1093–1110.

  5. Vysakh, S. and Binu, PK (2020, August) IoT based Mirai Vulnerability Scanner Prototype. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), IEEE, pp. 97–101.

  6. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12–22.

    Article  Google Scholar 

  7. Kambourakis, G., Kolias, C. and Stavrou, A. (2017) The mirai botnet and the iot zombie armies. In MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM) (2017, October), IEEE, pp. 267–272.

  8. Geenens, P. IoT Botnets. Botnets: Architectures, Countermeasures, and Challenges, pp.33

  9. Qureshi, N.M.F., Siddiqui, I.F., Abbas, A. and Bashir, A.K. (2019) Pseudo diversion onto persistent IoT-botnet connectivity through data analytics. KSII The 14th Asia Pacific International Conference on Information Science and Technology(APIC-IST), 2019, 264–267.

  10. Wang, Y., & Li, T. (2020). Local feature selection based on artificial immune system for classification. Applied Soft Computing, 87, 105989.

    Article  Google Scholar 

  11. Li, D., Liu, S., Gao, F., & Sun, X. (2020). Continual learning classification method with new labeled data based on the artificial immune system. Applied Soft Computing, 94, 106423.

    Article  Google Scholar 

  12. Li, J., Liu, Z. M., Li, C., & Zheng, Z. (2020). Improved artificial immune system algorithm for Type-2 fuzzy flexible job shop scheduling problem. IEEE Transactions on Fuzzy Systems., 29(11), 3234–3248.

    Article  Google Scholar 

  13. Li, D., Liu, S., Gao, F., & Sun, X. (2021). Continual learning classification method with constant-sized memory cells based on the artificial immune system. Knowledge-Based Systems, 213, 106673.

    Article  Google Scholar 

  14. Kumar, D.V., & Ramasamy, V. (2020). Improved intrusion detection classifier using cuckoo search optimization with support vector machine. ICTACT Journal on Soft Computing, 10(2), 2029–2034.

  15. Verma, A., & Ranga, V. (2020). CoSec-RPL: Detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommunication Systems, 75, 43–61.

    Article  Google Scholar 

  16. Alves, M.R., Delgado, Lopes, H.S. and Freitas, A.A. (2004, September) An artificial immune system for fuzzy-rule induction in data mining. In: International Conference on Parallel Problem Solving from Nature ,Springer, Berlin, Heidelberg., pp. 1011–1020.

  17. Kotov, VD and Vasilyev, VI (2009, October) Artificial immune system based intrusion detection system. In: Proceedings of the 2nd international conference on Security of information and networks ,pp. 207–212.

  18. Anand, P., Singh, Y., Selwal, M., Alazab, T. S., & Kumar, N. (2020). IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges. IEEE Access, 8, 168825–168853.

    Article  Google Scholar 

  19. Aldhaheri, S., Alghazzawi, D., Cheng, L., Alzahrani, B., & Al-Barakati, A. (2020). Deepdca: Novel network-based detection of iot attacks using artificial immune system. Applied Sciences, 10(6), 1909.

    Article  Google Scholar 

  20. Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8), 2661–2674.

    Article  Google Scholar 

  21. Aziz, S., Hassanien, M. A., & Hanafi, S. E. O. (2012). Artificial immune system inspired intrusion detection system using genetic algorithm. Informatica, 36(4), 347–357.

    Google Scholar 

  22. Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., & Lloret, J. (2017). Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access, 5, 18042–18050.

    Article  Google Scholar 

  23. Sudqi Khater, B., Wahab, A. W. B. A., Idris, M. Y. I. B., Hussain, M. A., & Ibrahim, A. A. (2019). A lightweight perceptron-based intrusion detection system for fog computing. Applied Sciences, 9(1), 178.

    Article  Google Scholar 

  24. Nour Moustafa. The BOT-IOT Dataset. https://doi.org/10.21227/r7v2-x988

  25. External Data Source. The BoT-IoT Dataset, DS-1296. https://doi.org/10.23721/100/1504338

  26. BrunoSous, TiagoCruz, VascoPereira and MiguelArieiro. Denial Of Service And Man In The Middle Attacks In Programmable Logic Controllers. https://doi.org/10.21227/mewp-g646

Download references

Funding

There is no funding provided to prepare the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sabitha.

Ethics declarations

Conflict of interest

There is no conflict of Interest between the authors regarding the manuscript preparation and submission.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Publish

There is no consent or any copyright needed to get concerns in the manuscript.

Consent to participate

There is no consent to participate or any concerns in the manuscript.

Informal Consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sabitha, R., Gopikrishnan, S., Bejoy, B.J. et al. Network Based Detection of IoT Attack Using AIS-IDS Model. Wireless Pers Commun 128, 1543–1566 (2023). https://doi.org/10.1007/s11277-022-10009-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10009-4

Keywords

Navigation