Skip to main content
Log in

An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In recent years, the Internet of Things has grown visibly and soon will be an essential part of our daily lives. This increases the number of transactions in a network and with that risks to these sensitive data increase too; thus, we require a smart system to detect any unauthorized advances to an IoT network and prevent those risks. This system predicts and delivers possibilities of the intrusion based on a few attributes identified using feature engineering. An Intrusion Detection System is tested on its ability to detect malicious activities within IoT networks. Here, we propose an Anomaly-based Intrusion Detection System that detects and prevents attacks on the IoT environment. This approach has two primary objectives to address. First, the data require filtration using the correlation coefficient to combine the probability of distribution to identify features that have a positive impact on the accuracy. Second, the classifier algorithm identifies the behavior using the trust factor based on the selected features. In this step, we analyze the precision, recall, and f1-score of the model on a pre-existing NSL-KDD dataset where the proposed model obtained 98.4% accuracy along with high TPR (True-Positive Rate) and low FPR (False-Positive Rate).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Singh KP, Tomar S, Jain U, Hussain M. Simplified and secure session key sharing for the Internet of Things (IoT) networks. In: International conference on internet of things and connected technologies. Berlin: Springer; 2020. p. 319–32.

    Google Scholar 

  2. Kumar A, Lim TJ. EDIMA: early detection of IoT malware network activity using machine learning techniques. IEEE World Forum Internet of Things (WF-IoT). 2019. https://doi.org/10.1109/WF-IoT.2019.8767194.

    Article  Google Scholar 

  3. Chang H, Feng J, Chaofan D. HADIoT: a hierarchical anomaly detection framework for IoT. IEEE Access. 2020. https://doi.org/10.1109/ACCESS.2020.3017763.

    Article  Google Scholar 

  4. Depren O, Topallar M, Anarim E, Ciliz MK. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst Appl. 2005;29:713–22. https://doi.org/10.1016/j.eswa.2005.05.002.

    Article  Google Scholar 

  5. Denning DE. An intrusion-detection model. In: IEEE Symposium on Security and Privacy, 1986, pp. 118–131.

  6. Lincoln M. Laboratory, DARPA intrusion detection data sets. 2016. https://www.ll.mit.edu/ideval/data/. Accessed 07 Apr 2016.

  7. McHugh J. Testing intrusion detection systems: a [33] critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secure. 2000;3(4):262–94.

    Article  Google Scholar 

  8. De la Hoz E, De La Hoz E, Ortiz A, Ortega J, Prieto B. PCA filtering and probabilistic SOM for network intrusion detection. Adv Comput Intell. 2015;164:71–81.

    Google Scholar 

  9. Ravale U, Marathe N, Padiya P. Feature selection based hybrid anomaly intrusion detection system using K-means and RBF kernel function. In: Proceeding of international conference on advanced computing technologies and applications, ICACTA-2015, procedia computer science, vol. 45. Amsterdam: Elsevier; 2015. p. 428–35.

    Google Scholar 

  10. Haddadpajouh H, Javidan R, Khayami R, Dehghantanha A, Choo K-KR. A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 2016. https://doi.org/10.1109/TETC.2016.2633228.

    Article  Google Scholar 

  11. Murali S, Jamalipour A. A lightweight intrusion detection for Sybil attack under mobile RPL in the Internet of Things. IEEE Internet Things J. 2019. https://doi.org/10.1109/jiot.2019.2948149.

    Article  Google Scholar 

  12. Altwaijry H, Algarny S. Bayesian-based intrusion detection system. J King Saud Univ Comp Inf Sci. 2012;24:1–6.

    Article  Google Scholar 

  13. Shrivas AK, Dewangan AK. An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int J Comput Appl. 2014;99:8–13.

    Google Scholar 

  14. Bhavsar YB, Waghmare KC. Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng. 2013;3:581–6.

    Google Scholar 

  15. Dhanabal L, Shantharajah SP. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng. 2015;4:446–52.

    Google Scholar 

  16. Wagh SK. Survey on intrusion detection system using machine learning techniques. Int J Comput Appl. 2013;78(16):30–7.

    Google Scholar 

  17. Qiu C, Shan J, Polytechnic B, Shandong B. Research on intrusion detection algorithm based on BP neural. Network. 2015;9(4):247–58.

    Google Scholar 

  18. Vokorokos L, Balaiz A, Chovanec M. Intrusion detection system using self-organizing map. Informatica. 2006;6(1):1–6.

    Google Scholar 

  19. Planquart J-P. "Application of neural networks to intrusion detection". https://rr.sans.org/intrusion/neural.php (2001).

  20. Sahu SK, Sarangi S, Jena SK. A detailed analysis on intrusion detection datasets. In: Souvenir 2014 International Advance Computing Conference IACC, 2014, pp. 1348–1353.

  21. Allen J, Alan C, William F, John M, Jed P. State of the practice of intrusion detection technologies, Technical Report no. CMU/SEI-99-TR-028, Tech. Rep., 2000, p. 221.

  22. Paxson V. Bro: a system for detecting network intruders in real-time. Comput Netw. 1999;31(23):2435–63.

    Article  Google Scholar 

  23. Gajewski M, Batalla J, Mastorakis G, Mavromoustakis C. Anomaly traffic detection and correlation in smart home automation IoT systems. Trans Emerg Telecommun Technol. 2020. https://doi.org/10.1002/ett.4053.

    Article  Google Scholar 

  24. Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the kdd cup 99 data set. In: Proceedings of the Second IEEE international conference on computational intelligence for security and defense apps. Piscataway: IEEE Press; 2009. p. 53–8.

    Google Scholar 

  25. Choudhary S, Kesswani N. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Proced Comput Sci. 2020;167:1561–73. https://doi.org/10.1016/j.procs.2020.03.367.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krishan Pal Singh.

Ethics declarations

Conflict of Interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Enabling Innovative Computational Intelligence Technologies for IOT” guest edited by Omer Rana, Rajiv Misra, Alexander Pfeiffer, Luigi Troiano, and Nishtha Kesswani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, K.P., Kesswani, N. An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor. SN COMPUT. SCI. 3, 168 (2022). https://doi.org/10.1007/s42979-022-01053-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01053-9

Keywords

Navigation