Abstract
In recent days Internet of Things attained more familiarity. Although it is a promising technology, it tends to lead to a variety of security issues. Conventional methods such as IoT ecosystem based solutions were not suitable to give dilemmas to the system. A new system model called adaptive and intelligent Artificial Immune System (AIS) imitates the process of human being an immune system that consists of eligible properties of this varying environment. Therefore, it enhanced IoT security. Conventionally classifiers such as Random Forest Classifier, Recurrent Neural Network and K-nearest neighbours are used to classify the signals as normal or abnormal and predict malicious attacks. But unfortunately, these classifiers generated a high false alarm rate. Thus, a framework with maximum accuracy and minimum false alarm rate was required. In this work, the AIS model adopts the benefits of the Hopfield Neural Network (HNN) for classification. HNN classifier has a fixed weight, as it cannot be changed for its backpropagation property. This work optimally selects the fixed weight using Fast- Particle Swarm Optimization (F-PSO) and helps to enhance the accuracy of the HNN classifier. This classifier model then differentiates IoT attacks with a high detection rate and normal signal. Three datasets are taken to execute the proposed model and define its accuracy. The proposed Artificial Immune system using HNN for Intrusion Detection System (AIS-IDS) model exhibits 99.8% accuracy for the first dataset and minimum error value. The false alarm rate was minimized using danger theory and its high activation function; thus, the false alarm rate was minimized by up to 8% more than previous classifiers.
Similar content being viewed by others
Data availability statement
There is no availability of data or materials available or report for the manuscript.
Code availability
No code is available for this manuscript.
References
Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287–2310.
Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors, 20(13), 3625.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M. and Kumar, D. (2017) Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security, 17:1093–1110.
Vysakh, S. and Binu, PK (2020, August) IoT based Mirai Vulnerability Scanner Prototype. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), IEEE, pp. 97–101.
Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12–22.
Kambourakis, G., Kolias, C. and Stavrou, A. (2017) The mirai botnet and the iot zombie armies. In MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM) (2017, October), IEEE, pp. 267–272.
Geenens, P. IoT Botnets. Botnets: Architectures, Countermeasures, and Challenges, pp.33
Qureshi, N.M.F., Siddiqui, I.F., Abbas, A. and Bashir, A.K. (2019) Pseudo diversion onto persistent IoT-botnet connectivity through data analytics. KSII The 14th Asia Pacific International Conference on Information Science and Technology(APIC-IST), 2019, 264–267.
Wang, Y., & Li, T. (2020). Local feature selection based on artificial immune system for classification. Applied Soft Computing, 87, 105989.
Li, D., Liu, S., Gao, F., & Sun, X. (2020). Continual learning classification method with new labeled data based on the artificial immune system. Applied Soft Computing, 94, 106423.
Li, J., Liu, Z. M., Li, C., & Zheng, Z. (2020). Improved artificial immune system algorithm for Type-2 fuzzy flexible job shop scheduling problem. IEEE Transactions on Fuzzy Systems., 29(11), 3234–3248.
Li, D., Liu, S., Gao, F., & Sun, X. (2021). Continual learning classification method with constant-sized memory cells based on the artificial immune system. Knowledge-Based Systems, 213, 106673.
Kumar, D.V., & Ramasamy, V. (2020). Improved intrusion detection classifier using cuckoo search optimization with support vector machine. ICTACT Journal on Soft Computing, 10(2), 2029–2034.
Verma, A., & Ranga, V. (2020). CoSec-RPL: Detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommunication Systems, 75, 43–61.
Alves, M.R., Delgado, Lopes, H.S. and Freitas, A.A. (2004, September) An artificial immune system for fuzzy-rule induction in data mining. In: International Conference on Parallel Problem Solving from Nature ,Springer, Berlin, Heidelberg., pp. 1011–1020.
Kotov, VD and Vasilyev, VI (2009, October) Artificial immune system based intrusion detection system. In: Proceedings of the 2nd international conference on Security of information and networks ,pp. 207–212.
Anand, P., Singh, Y., Selwal, M., Alazab, T. S., & Kumar, N. (2020). IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges. IEEE Access, 8, 168825–168853.
Aldhaheri, S., Alghazzawi, D., Cheng, L., Alzahrani, B., & Al-Barakati, A. (2020). Deepdca: Novel network-based detection of iot attacks using artificial immune system. Applied Sciences, 10(6), 1909.
Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8), 2661–2674.
Aziz, S., Hassanien, M. A., & Hanafi, S. E. O. (2012). Artificial immune system inspired intrusion detection system using genetic algorithm. Informatica, 36(4), 347–357.
Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., & Lloret, J. (2017). Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access, 5, 18042–18050.
Sudqi Khater, B., Wahab, A. W. B. A., Idris, M. Y. I. B., Hussain, M. A., & Ibrahim, A. A. (2019). A lightweight perceptron-based intrusion detection system for fog computing. Applied Sciences, 9(1), 178.
Nour Moustafa. The BOT-IOT Dataset. https://doi.org/10.21227/r7v2-x988
External Data Source. The BoT-IoT Dataset, DS-1296. https://doi.org/10.23721/100/1504338
BrunoSous, TiagoCruz, VascoPereira and MiguelArieiro. Denial Of Service And Man In The Middle Attacks In Programmable Logic Controllers. https://doi.org/10.21227/mewp-g646
Funding
There is no funding provided to prepare the manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of Interest between the authors regarding the manuscript preparation and submission.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to Publish
There is no consent or any copyright needed to get concerns in the manuscript.
Consent to participate
There is no consent to participate or any concerns in the manuscript.
Informal Consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sabitha, R., Gopikrishnan, S., Bejoy, B.J. et al. Network Based Detection of IoT Attack Using AIS-IDS Model. Wireless Pers Commun 128, 1543–1566 (2023). https://doi.org/10.1007/s11277-022-10009-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10009-4