Skip to main content
Log in

RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

This article was retracted on 13 February 2024

This article has been updated

Abstract

Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT security is significant. The nature of attacks is dynamic, and addressing this requires designing dynamic methods and a self-adaptable scheme to discover security attacks from malicious use of IoT equipment. The best detection mechanism against attacks from compromised IoT devices includes machine learning techniques. This study emphasizes the latest literature on attack types and uses a scheme based on machine learning for network support in IoT and intrusion detection. Therefore, the current work includes a thorough analysis of multiple intelligence methods and their deployed architectures of network intrusion detection, focusing on IoT attacks and machine learning-based intrusion detection schemes. Moreover, it explores methods based on machine learning appropriate for identifying IoT devices associated with cyber attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Change history

References

  1. Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster Eur Res Projects Internet Things Eur Commision 3:34–36

    Google Scholar 

  2. Amaral LA, Hessel FP, Bezerra EA, Corrêa JC, Longhi OB, Dias TFO (2011) eCloudRFID–A mobile software framework architecture for pervasive RFID-based applications. J Netw Comput Appl 34:972–979. https://doi.org/10.1016/j.jnca.2010.04.005

    Article  Google Scholar 

  3. Johannes D, Heineke K, Reinbacher T, Wee D (2018) The internet of things: how to capture the value of IoT. Technical Report pp. 1–124

  4. Mosenia A, Jha NK (2016) A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5:586–602

    Article  Google Scholar 

  5. M Young 1989 Checklist before starting the analysis 2 In: The Technical Writer’s Handbook University Science Mill Valley: CA

  6. Yousuf O, Mir RN (2019) A survey on the internet of things security: State-of-art, architecture, issues and countermeasures. Inf Comput Secur 27:292–323

    Article  Google Scholar 

  7. Karsligil ME, Yavuz AG, Guvensan MA, Hanifi K, Bank B (2017) Network intrusion detection using machine learning anomaly detection algorithms. In: 25th Signal Processing Commun Applications Conf (SIU), IEEE. https://doi.org/10.1109/siu.2017.7960616

  8. Yang Z, Yue Y, Yang Y, Peng Y, Xiaobo et al. (2011) Study and application on the architecture and key technologies for IoT. In: 2011 Int Conf Multimed Technol, IEEE, pp. 747–751

  9. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54:2787–2805

    Article  Google Scholar 

  10. Torkaman A, Seyyedi MA (2016) Analyzing IoT reference architecture models. Int J Comput Sci Softw Eng 5:154

    Google Scholar 

  11. Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the Internet of Things. In: 2012 Int Conf Collaboration Technol Syst (CTS), pp. 21–26, IEEE

  12. Moustafa N, Creech G, Sitnikova E, Keshk M (2017) Collaborative anomaly detection framework for handling big data of cloud computing. In: 2017 Military Commun Inf Syst Conf (MilCIS), pp. 1–6, IEEE

  13. Moustafa N, Choo KR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Foren Secur 14:1975–1987

    Article  Google Scholar 

  14. Li F, Han Y, Jin C (2016) Practical access control for sensor networks in the context of the internet of things. Comput Commun 89–90:154–164. https://doi.org/10.1016/j.comcom.2016.03.007

    Article  ADS  Google Scholar 

  15. Sudqi Khater B, Wahid A, Idris M, Hussain M, Ibrahim AA (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9:178. https://doi.org/10.3390/app9010178

    Article  Google Scholar 

  16. Sicari S, Rizzardi A, Grieco LA, Cen-Porisini A (2015) Security, privacy and trust in internet of things: The road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  17. Asharf J, Moustafa N, Khurshid H, Debie E, Haider W, Wahab A (2020) A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics 9:1177

    Article  Google Scholar 

  18. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045

    Article  Google Scholar 

  19. Sharma V, You I, Andersson K, Palmieri F, Rehmani MH, Lim J (2019) Security, privacy and trust for smart mobile-Internet of Things (M-IoT): a survey. IEEE Access 8:167123–167163. https://doi.org/10.1109/ACCESS.2020.3022661

    Article  Google Scholar 

  20. Liao B, Ali Y, Nazir S, He L, Khan HU (2020) Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access 8:120331–120350. https://doi.org/10.1109/ACCESS.2020.3006358

    Article  Google Scholar 

  21. Nandy T, Idris MYIB, Md Noor R, Mat Kiah L, Lun LS, Annuar Juma’at NB, Ahmedy I, Abdul Ghani N, Bhattacharyya S, (2019) Review on security of internet of things authentication mechanism. IEEE Access 7:151054–151089. https://doi.org/10.1109/ACCESS.2019.2947723

    Article  Google Scholar 

  22. Sen S, Clark JA (2011) Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput Netw 55:3441–3457

    Article  Google Scholar 

  23. Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Commun Inf Syst Conf (MilCIS) IEEE pp. 1–6

  24. Zhao K, Ge L (2013) A survey on the internet of things security. Comput Intell Secur (CIS) 10

  25. Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:11

    Google Scholar 

  26. Suo H, Wan J, Zou JC, Liu J (2012) Security in the internet of things: a review. In: Proc 2012 Int Conf Comput Sci Electron Eng Hangzhou China, 3: 648–651

  27. Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 14:199–221

    Article  Google Scholar 

  28. Zarpelão BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37

    Article  Google Scholar 

  29. Da Costa KAP et al (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157

    Article  Google Scholar 

  30. Kolias CG, Kambourakis AS, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50:80–84

    Article  Google Scholar 

  31. Garadi A, Mohamed MA, Al-Ali A, Du A, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023

  32. Kolias C, Stavrou A, Voas J, Bojanova I, Kuhn R (2016) Learning Internet-of-Things security hands-on. IEEE Secur Privacy 14:37–46

    Article  Google Scholar 

  33. Marsden T, Moustafa N, Sitnikova E, Creech G (2017) Probability risk identification-based intrusion detection system for SCADA systems. In: Int Conf Mobile Netw Manag pp. 353–363

  34. Moustafa N, Misra G, Slay J (2021) Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans Sustain Comput 6(2):245–256. https://doi.org/10.1109/TSUSC.2018.2808430

    Article  Google Scholar 

  35. Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36:42–57

    Article  Google Scholar 

  36. Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism. Int J Distribut Sens Netw 2015:11–10

    Google Scholar 

  37. Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. Progress in Computing. Springer, Analytics and Networking, pp 125–135

    Google Scholar 

  38. Butun I, Morgera SD, Sankar R (2013) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16:266–282

    Article  Google Scholar 

  39. Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv (CSUR) 46:1–29

    Article  Google Scholar 

  40. Mishra A, Nadkarni K, Patcha A (2004) Intrusion detection in wireless ad hoc networks. IEEE Wirel Commun 11:48–60

    Article  Google Scholar 

  41. Elrawy M, Awad A, Hamed H (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comp 7:21. https://doi.org/10.1186/s13677-018-0123-6

    Article  Google Scholar 

  42. Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutor 20:3496–3509

    Article  Google Scholar 

  43. Abduvaliyev A, Pathan AK, Zhou J, Roman R, Wong W (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15:1223–1237

    Article  Google Scholar 

  44. Anantvalee T, Wu J (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, Boston, MA, pp 159–180

    Chapter  Google Scholar 

  45. Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9:2484–2556

    Article  Google Scholar 

  46. Lawal MA, Hassan SRA, SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374

    Article  Google Scholar 

  47. Garg S, Kaur K, Batra S, Kaddoum G, Kumar N, Boukerche A (2020) A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Comput Syst 104:105–118

    Article  Google Scholar 

  48. Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya A, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Service Manag 16:24–935

    Google Scholar 

  49. Cirani S et al (2014) A scalable and self-configuring architecture for service discovery in the internet of things. IEEE Internet of Things J 1:508–521

    Article  Google Scholar 

  50. Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of Internet of Things. Int Conf Adv Comput Theory Eng ICACTE 5:484–487. https://doi.org/10.1109/ICACTE.2010.5579493

    Article  Google Scholar 

  51. Sethi P, Sarangi S (2017) Internet of things: architectures, protocols, and applications. J Electric Comput Eng 2017:1–25

    Article  Google Scholar 

  52. Khan MA, Muhammad K, Sharif M, Akram T, Kadry S (2021) Intelligent fusion-assisted skin lesion localization and classification for smart healthcare. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06490-w

    Article  PubMed  PubMed Central  Google Scholar 

  53. Vacca J (2013) Computer and information security handbook. Morgan Kaufmann, Amsterdam

    Google Scholar 

  54. Ning J, Xu J, Liang K, Zhang F, Chang EC (2018) Passive attacks against searchable encryption. IEEE Trans Inf Forensics Secur 14(3):789–802

    Article  Google Scholar 

  55. Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2014) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surv Tutor 17:998–1022

    Article  Google Scholar 

  56. Hemant N, Nihan S, Suresh, (2021) Survey on cyber attack. IRJCS Int Res J Comput Sci 8(4):97–101

    Google Scholar 

  57. Lounis K, Zulkernine M (2020) Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 8:88892–88932

    Article  Google Scholar 

  58. Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Palladam, India, pp. 32–37. https://doi.org/10.1109/I-SMAC.2017.8058363

    Chapter  Google Scholar 

  59. Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IoT: modelling and defenses. In: 2017 Int Conf Adv Comput, Commun Informatics (ICACCI) pp. 2323–2327

  60. Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18:459–473

    Google Scholar 

  61. Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22:1646–1685

    Article  Google Scholar 

  62. Khanam S, Ahmedy I, Idris M, Jaward M, Sabri A (2020) A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3037359

    Article  Google Scholar 

  63. Singh A, Patro B (2019) Security of low computing power devices: a survey of requirements, challenges & possible solutions. Cybern Inf Technol 19:133–164. https://doi.org/10.2478/cait-2019-0008

    Article  Google Scholar 

  64. Sun L, Wang X, Wang J, Liu M, Xia G (2020) RELAP5 foresight thermal-hydraulic analysis of hypothesis passive safety injection system under LOCA for an existing NPP in China. Sci Technol Nuclear Install 2020:1–14

    Article  Google Scholar 

  65. Heydt-Benjamin TS, Bailey DV, Fu K, Juels A, O’Hare T (2007) Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich S, Dhamija R (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, p. 4886, Springer, Berlin: Heidelberg

  66. Amin YM, Abdel-Hamid AT (2016) A comprehensive taxonomy and analysis of IEEE 802. 15. 4 attacks. J Electr Comput Eng 2016:4

    Google Scholar 

  67. Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput Stand Interfaces 31:931–941

    Article  Google Scholar 

  68. Kumar A, Varadarajan V, Kumar A, Dadheech P, Choudhary SS, Kumar VA, Veluvolu KC (2021) Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess Microsyst 80:103352

    Article  Google Scholar 

  69. Mathur A, Newe T, Rao M (2016) Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors 16:118

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  70. Attique Khan M, Sharif M, Akram T, Kadry S, Hsu C-H (2021) A two-stream deep neural network-based intelligent system for complex skin cancer types classification. Int J Intell Syst. https://doi.org/10.1002/int.22691

    Article  Google Scholar 

  71. Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl 9:355–373

    Google Scholar 

  72. Hamza A, Gharakheili HH, Sivaraman V (2020) IoT network security: requirements, threats, and countermeasures. arXiv preprint arXiv:2008.09339

  73. Farooq M, Waseem M, Khairi A, Mazhar P (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111:1–6. https://doi.org/10.5120/19547-1280

    Article  Google Scholar 

  74. Mitropoulos D, Spinellis D (2017) Fatal injection: A survey of modern code injection attack countermeasures. Peer J Comput Sci 3:e136

  75. Aman MN, Sikdar B, Chua KC, Ali A (2018) Low power data integrity in IoT systems. IEEE Internet of Things J 5:3102–3113

    Article  Google Scholar 

  76. Staddon E, Loscri V, Mitton N (2021) Attack categorisation for IoT applications in critical infrastructures, a Survey. Appl Sci 11:7228

    Article  CAS  Google Scholar 

  77. Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network, 2021 IEEE 11th Ann Comput Commun Workshop Conf (CCWC), pp. 0853–0859

  78. Hoang TM, Duong TQ, Tuan HD, Lambotharan S, Hanzo L (2021) Physical layer security: detection of active eavesdropping attacks by support vector machines. IEEE Access 9:31595–31607

    Article  Google Scholar 

  79. Xu L, Chen J, Liu M, Wang X (2019) Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8:146

    Article  Google Scholar 

  80. Patel A, Qassim Q, Wills C (2010) A survey of intrusion detection and prevention systems. Inf Manag Comput Secur 18:277–290

    Article  Google Scholar 

  81. Hanif, M. A., Akram, T., Shahzad, A., Tariq, U., Choi, J. I., & Zulfiqar, Z (2021). Smart Devices Based Multisensory Approach for Complex Human Activity Recognition. CMC 1–15.

  82. Alladi T et al (2021) Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28:144–149

    Article  Google Scholar 

  83. Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63:807–819

    Article  MathSciNet  Google Scholar 

  84. Macia-Perez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martinez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca, (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58:722–732

    Article  Google Scholar 

  85. Santos L, Gonçalves R, Rabadao C, Martins J (2021) A flow-based intrusion detection framework for Internet of Things networks. Cluster Comput 1–21

  86. Ioulianou P, Vasilakis V, Moscholios I, Logothetis M (2018) A signature-based intrusion detection system for the internet of things. Paper presented at Information and Communication Technology Form, Graz, Austria

    Google Scholar 

  87. Kumar V, Sangwan OP (2012) Signature based intrusion detection system using SNORT. Int J Comput Appl Inf Technol 1:35–41

    Google Scholar 

  88. Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE internet of things J 7:6882–6897. https://doi.org/10.1109/JIOT.2020.2970501

    Article  Google Scholar 

  89. Muna AL-H, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl 41:1–11

    Google Scholar 

  90. Ashraf, A. H., Imran, M., Qahtani, A. M., Alsufyani, A., Almutiry, O., Mahmood, A., & Habib, M (2021). Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s. CMC 1–15.

  91. Kumar S, Gautam OH (2016) Computational neural network regression model for host based intrusion detection system. Perspect Sci 8:93–95

    Article  Google Scholar 

  92. Moore MR., Bridges RA, Combs FL, Starr MS, Prowell SJ (2017) Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1–4)

  93. Olufowobi H, Young C, Zambreno J, Bloom G (2019) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Vehicular Technol 69:1484–1494

    Article  Google Scholar 

  94. Kumar S, Spafford EH (1996) A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University

    Google Scholar 

  95. Kumar S, Spafford EH (1994) An application of pattern matching in intrusion detection. In: Technical Report 94-013, Dept. of Computer Science, Purdue University

    Google Scholar 

  96. Kumar V, Das AK, Sinha D (2020) Statistical analysis of the UNSW-NB15 dataset for intrusion detection. Computational intelligence in pattern recognition. Springer, Singapore, pp 279–294

    Chapter  Google Scholar 

  97. Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694

    Article  Google Scholar 

  98. Rahman MA, Taufiq Asyhari A, Leong LS, Satrya GB, Hai Tao M, Zolkipli MF (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324

    Article  Google Scholar 

  99. Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the Internet of Things. Proc IEEE World Congr Services, Jun 2015:21–28. https://doi.org/10.1109/SERVICES.2015.12

    Article  Google Scholar 

  100. Alsaadi E, Tubaishat A (2015) Internet of things: features, challenges, and vulnerabilities. Int J Adv Comput Sci Inform Technol 4(1):1–13

    Google Scholar 

  101. Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks. Countermeas Security Manag Schem 64:19–28

    Google Scholar 

  102. Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw, pp. 55–66

  103. Vacca JR (2012) Computer and information security handbook. Newnes

    Google Scholar 

  104. Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KKR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inform 16:5110–5118

    Article  Google Scholar 

  105. Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things. Int Conf Natural Comput IEEE 1:212–216

    CAS  Google Scholar 

  106. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th Int Conf Wirel Mobile Comput, Netw Commun (WiMob), pp. 600–607

  107. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An IDS framework for Internet of Things empowered by 6LoWPAN. In Proc 2013 ACM SIGSAC Conf Comput Commun Secur, pp. 1337–1340

  108. Oh D, Kim D, Ro WW (2014) A malicious pattern detection engine for embedded security systems in the internet of things. Sensors 14:24188–24211

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  109. Keshk M, Moustafa N, Turnbull SE, B (2018) Privacy-preserving big data analytics for cyber-physical systems. Wirel Netw. https://doi.org/10.1007/s11276-018-01912-5

    Article  Google Scholar 

  110. Debar H (2000) An introduction to intrusion-detection systems. In: Proc Connect 2000

  111. Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ 800:94

    Google Scholar 

  112. Amaral JP, Oliveira LM, Rodrigues JJ, Han G, Shu L (2014) Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE Int Conf Commun (ICC), pp. 1796–1801

  113. Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad hoc Netw 11:2661–2674

    Article  Google Scholar 

  114. Ahmim A, Derdour M, Ferrag MA (2018) An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst 31:e3547

    Article  Google Scholar 

  115. Setiadi FF, Kesiman MWA, Aryanto KYE (2021) Detection of dos attacks using naive Bayes method based on Internet of Things (IoT). In: J Physics: Conf Series 1810:012013. IOP Publishing

  116. Mukherjee S, Sharma N (2017) Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol 4:119–128

    Article  Google Scholar 

  117. Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713

    Article  Google Scholar 

  118. Swarnkar M, Hubballi N (2016) OCPAD: One class naive Bayes classifier for payload-based anomaly detection. Expert Syst with Appl 64:330–339

    Article  Google Scholar 

  119. Kanwal S, Shah JH, Khan MA, Nisa M, Kadry S, Sharif M, Maheswari M (2021) Person re-identification using adversarial haze attack and defense: a deep learning framework. Comput Electric Eng 96:107542

    Article  Google Scholar 

  120. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497

    Article  Google Scholar 

  121. Majid, A., Khan, M. A., Nam, Y., Tariq, U., Roy, S., Mostafa, R. R., & Sakr, R. H. (2021). COVID19 classification using CT images via ensembles of deep learning models. Computers, Materials and Continua, pp. 319–337.

  122. Mugunthan SR (2020) Decision tree based interference recognition for fog enabled IoT architecture. J Trends Comput Sci Smart Technol (TCSST) 2:15–25

    Article  Google Scholar 

  123. Du W, Zhan Z (2002) Building decision tree classifier on private data. Proc IEEE Int Conf Privacy, Secur Data Min, Aus Comput Soc Inc, Sydney, Aus 14:1–8

    Google Scholar 

  124. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8:1210

    Article  Google Scholar 

  125. Manhas J, Kotwal S (2021) Implementation of intrusion detection system for internet of things using machine learning techniques. Multimedia SECURITY. Springer, Singapore, pp 217–237

    Chapter  Google Scholar 

  126. Goeschel K (2016) Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon, IEEE, 1–6

  127. Li W, Yi P, Wu Y, Pan L, Li J (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electric Comput Eng. https://doi.org/10.1155/2014/240217

    Article  Google Scholar 

  128. Farahani G (2021) Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw. https://doi.org/10.1155/2021/8814141

    Article  Google Scholar 

  129. Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M (2020) A combination strategy of feature selection based on an integrated optimization algorithm and weighted K-nearest neighbor to improve the performance of network intrusion detection. Electronics 9:1206

    Article  Google Scholar 

  130. Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7:314–323

    Article  Google Scholar 

  131. Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2:45–66

    Google Scholar 

  132. Jing D, Chen H (2019) SVM based network intrusion detection for the UNSW-NB15 dataset. 2019 IEEE 13th Int Conf ASIC (ASICON), pp. 1–4

  133. Rehman, M. U., Ahmed, F., Khan, M. A., Tariq, U., Alfouzan, F. A., Alzahrani, N. M., & Ahmad, J (2021). Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks. CMC pp. 1–15.

  134. Liu Y, Pi D (2017) A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11:4043

    Google Scholar 

  135. Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: ICMLA pp. 168–174

  136. Wagner C, François J, Engel T (2011) Machine learning approach for IP-flow record anomaly detection. Int Conf Res Networking. Springer, Berlin, Heidelberg, pp 28–39

    Google Scholar 

  137. Garg S, Kaur K, Kaddoum G, Gagnon F, Kumar N, Han Z (2019) Sec-IoV: A multi-stage anomaly detection scheme for Internet of vehicles, In: Proc ACM MobiHoc Workshop Pervasive Syst IoT Era, pp. 37–42

  138. Torres JM, Comesaña CI, Garcia-Nieto PJ (2019) Machine learning techniques applied to cybersecurity. Int J Mach Learn Cybernet 10:2823–2836

    Article  Google Scholar 

  139. Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th Int Conf Distributed Comput Sensor Syst, IEEE, pp. 652–658

  140. Lin K-C, Chen S, Hung JC (2014) Botnet detection using support vector machines with artificial fish swarm algorithm. J Appl Math. https://doi.org/10.1155/2014/986428

    Article  Google Scholar 

  141. Breiman L (2001) Random forests. Mach Learning 45:5–32

    Article  Google Scholar 

  142. Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17:1976

    Article  ADS  Google Scholar 

  143. Chen, Y., Tao, J., Zhang, Q., Yang, K., Chen, X., Xiong, J., & Xie, J. (2020). Saliency detection via the improved hierarchical principal component analysis method. Wireless communications and mobile computing2020.

  144. Islam N, Farhin F, Sultana I, Kaiser MS, Rahman MS, Mahmud M, Sanwar Hosen ASM, Cho GH (2021) Towards machine learning based intrusion detection in IoT networks. Comput Mater Contin 69:1801–1821

    Google Scholar 

  145. Zhang J, Zulkernine M (2006) A hybrid network intrusion detection technique using random forests, In First Int Conf on Availability, Reliability Secur (ARES '06), IEEE, p. 8

  146. Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE Secur Privacy Workshops (SPW), pp. 29–35

  147. Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, et al. (2017) Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv, 1709.04647

  148. Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17

    Article  Google Scholar 

  149. Illy P, Kaddoum G, Moreira CM, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE Wirel Commun Netw Conf (WCNC), pp. 1–7

  150. Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55:78–87

    Article  Google Scholar 

  151. Zhang H, Liu D, Luo Y, Wang D (2012) Adaptive dynamic programming for control: algorithms and stability. Springer Sci Bus Media

  152. Baba MN, Makhtar M, Fadzli SA, Awang MK (2015) Current issues in ensemble methods and its applications. J Theoretical Appl Technol 81:266

    Google Scholar 

  153. Santana L, Silva L, Canuto AMP, Pintro F, Vale KMO (2010) A comparative analysis of genetic algorithm and ant colony optimization to select attributes for an heterogeneous ensemble of classifiers. In: IEEE Congress Evolutionary Comput, pp. 1–8

  154. Aburomman AA, Reaz MBI (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Comput 38:360–372

    Article  Google Scholar 

  155. Gaikwad DP, Thool RC (2015) Intrusion detection system using bagging ensemble method of machine learning. In: 2015 Int Conf Comput Commun Control Automation, IEEE, pp. 291–295

  156. Irshad M, Sharif M, Yasmin M, Rehman A, Khan MA (2021) Discrete light sheet microscopic segmentation of left ventricle using morphological tuning and active contours. Microscopy Res Tech. https://doi.org/10.1002/jemt.23906

    Article  Google Scholar 

  157. Bosman HHWJ, Iacca G, Tejada A, Wörtche HF, Liotta A (2015) Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw 35:14–36

    Article  Google Scholar 

  158. Hussain N, Khan MA, Kadry S, Tariq U, Mostafa RR, Choi JI, Nam Y (2021) Intelligent deep learning and improved whale optimization algorithm based framework for object recognition. Hum Cent Comput Inf Sci 11:34

    Article  Google Scholar 

  159. Hartigan J, Wong MA (1979) AK-means clustering algorithm. J Royal Stat Soc: Series C Appl Stat 28:100–108

    Google Scholar 

  160. Bhuyan M, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16:303–336

    Article  Google Scholar 

  161. Kanjanawattana S (2019) A novel outlier detection applied to an adaptive k-means. Int J Mach Learning Comput 9:569–574

    Article  Google Scholar 

  162. Muniyandi AP, Rajeswari R, Rajaram R (2012) Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithms. Procedia Eng 30:174–182

    Article  Google Scholar 

  163. Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the Internet of Things with challenge response authentication in fog computing. In: 2017 IEEE 36th Int Performance Comput Commun Conf (IPCCC), pp. 1–2

  164. Cintuglu MH, Mohammed OA, Akkaya K, Uluagac AS (2016) A survey on smart grid cyber-physical system testbeds. IEEE Commun Surv Tutor 19:446

    Article  Google Scholar 

  165. Sellappan D, Srinivasan R (2020) Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system. In Handbook of Research on Intelligent Data Processing and Information Security Systems, IGI Global, pp. 1–24

  166. Markam V, Dubey LSM (2012) A general study of associations rule mining in intrusion detection system. Int J Emerg Technol Adv Eng 2:347–356

    Google Scholar 

  167. Manimurugan S (2021) IoT-fog-cloud model for anomaly detection using improved naïve Bayes and principal component analysis. J Ambient Intell Humanized Comput, pp. 110

  168. Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things. In: 2017 IEEE 15th Intl Conf Dependable, Autonomic Secure Comput, 15th Intl Conf Pervasive Intell Comput, 3rd Intl Conf Big Data Intell Comput Cyber Science and Technol Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 836–843

  169. Hoang DH, Nguyen HD (2019) Detecting anomalous network traffic in IoT networks, In 2019 21st Int Conf Adv Commun Technol (ICACT), pp. 1143–1152

  170. Hussain J, Lalmuanawma S (2016) Feature analysis, evaluation and comparisons of classification algorithms based on noisy intrusion dataset. Procedia Comput Sci 92:188–198

    Article  Google Scholar 

  171. Ashfaq RAR, Wang X, Huang JZ, Abbas H, He Y (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484–497

    Article  Google Scholar 

  172. Raman MRG, Somu N, Kirthivasan K, Sriram VSS (2017) A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw 92:89–97

    Article  PubMed  Google Scholar 

  173. McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Secur (TISSEC) 3:262–294

    Article  Google Scholar 

  174. Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Commun Inf Syst Conf (MilCIS), pp. 1–6. IEEE

  175. Sharafaldin I, Gharib A, Lashkari AH, Ghorbani AA (2018) Towards a reliable intrusion detection benchmark dataset. Softw Netw 1:177–200

    Google Scholar 

  176. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31:357–374

    Article  Google Scholar 

  177. Nehinbe JO (2009) A simple method for improving intrusion detections in corporate networks. Int Conf Inf Secur Digital Forensics. Springer, Berlin, Germany, pp 111–122

    Google Scholar 

  178. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) A detailed analysis of the CICIDS2017 data set. Int Conf Inf Syst Security Privacy. Springer, Cham, pp 172–188

    Google Scholar 

  179. Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gen Comput Syst 100:779–796

    Article  Google Scholar 

  180. Pahl M-O, Aubet F-X (2018) DS2OS traffic traces: IoT traffic traces gathered in a the DS2OS IoT environment. https://www.kaggle.com/francoisxa/ds2ostraffictraces.

  181. Pahl M-O, Aubet F-X (2018) All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection. In: 2018 14th Int Conf Netw Service Manag (CNSM), pp. 72–80. IEEE

  182. Masduki BW, Ramli K, Saputra FA, Sugiarto D (2015) Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 Int Conf Quality Res (QiR), IEEE, pp. 56–64

  183. Bhuyan M, Bhattacharyya DK, Kalita JK (2015) Towards generating real-life datasets for network intrusion detection. Int J Netw Secur 17:683–701

    Google Scholar 

  184. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, pp. 108–116

  185. Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.

  186. Singh G, Khare N (2021) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl pp. 1–11

  187. Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Security Appl 53:102532

    Google Scholar 

  188. Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2021) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ, Develop Sustain, pp. 1–19

  189. Kanwal S, Iqbal Z, Al-Turjman F, Irtaza A, Khan MA (2021) Multiphase fault tolerance genetic algorithm for VM and task scheduling in datacenter. Inf Process Manag 58:102676

    Article  Google Scholar 

  190. Ansari GJ, Shah JH, Sharif M, Tariq U, Akram T (2021) A non-blind deconvolution semi pipelined approach to understand text in blurry natural images for edge intelligence. Inf Process Manag 58:102675

    Article  Google Scholar 

  191. Sharif A, Li JP, Saleem MA, Manogran G, Kadry S, Basit A, Khan MA (2021) A dynamic clustering technique based on deep reinforcement learning for internet of vehicles. J Intell Manuf 32:757–768

    Article  Google Scholar 

  192. Almadhor A, Rauf HT, Khan MA, Kadry S, Nam Y (2021) A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energ Rep, ISSN 2352–4847

  193. Saeed R, Rubab S, Asif S, Khan MM, Murtaza S, Kadry S, Nam Y, Khan MA (2021) An automated system to predict popular cybersecurity news using document embeddings. Comput Modeling Eng Sci 127:533–547

    Article  Google Scholar 

  194. Zhang Y-D, Alhusseni M, Kadry S, Wang S-H, Saba T, Iqbal T (2021) A fused heterogeneous deep neural network and robust feature selection framework for human actions recognition. Arabian J Sci Eng pp. 1–16

  195. Ahmed M, Ramzan M, Khan HU, Iqbal S, Choi J-I, Nam Y, Kadry S (2021) Real-time violent action recognition using key frames extraction and deep learning. CMC-Comput Mater Continua 69:2217–2230

    Article  Google Scholar 

  196. Nasir IM, Raza M, Shah JH, Khan MA, Rehman A (2021) Human action recognition Using machine learning in uncontrolled environment. In: 2021 1st Int Conf Artif Intell Data Analyt (CAIDA), IEEE, pp. 182–187

  197. Kiran S, Javed MY, Alhaisoni M, Tariq U, Nam Y, Damaševicius R, Sharif M (2021) Multi-layered deep learning features fusion for human action recognition. CMC-Comput Mater Continua 69:4061–4075

    Article  Google Scholar 

  198. Khan MA, Alhaisoni M, Armghan A, Alenezi F, Tariq U, Nam Y, Akram T (2021) Video analytics framework for human action recognition. CMC-Comput Mater Continua 68:3841–3859

    Article  Google Scholar 

  199. Zhang Y-D, Khan SA, Attique M, Rehman A, Seo S (2020) A resource conscious human action recognition framework using 26-layered deep convolutional neural network. Multimed Tools Appl, pp. 1–23

  200. Javed K, Khan SA, Saba T, Habib U, Khan JA, Abbasi AA (2020) Human action recognition using fusion of multiview and deep features: an application to video surveillance. Multimed Tools Applications, pp. 1–27

  201. Hussain UN, Lali IU, Javed K, Ashraf I, Tariq J, Ali H, Din A (2020) A unified design of ACO and skewness based brain tumor segmentation and classification from MRI scans. J Control Eng Appl Inform 22:43–55

    Google Scholar 

  202. Sharif M, Akram T, Bukhari SAC, Nayak RS (2020) Developed Newton-Raphson based deep features selection framework for skin lesion recognition. Pattern Recognit Lett 129:293–303

    Article  ADS  Google Scholar 

  203. Sharif M, Akram T, Damaševičius R, Maskeliūnas R (2021) Skin lesion segmentation and multiclass classification using deep learning features and improved moth flame optimization. Diagnostics 11:811

    Article  PubMed  PubMed Central  Google Scholar 

  204. Khan MA, Khan M, Sharif M, Akram T, de AlbuquerqueVC C (2021) Multi-class skin lesion detection and classification via teledermatology. IEEE J Biomed Health Inform. https://doi.org/10.1109/JBHI.2021.3067789

    Article  PubMed  PubMed Central  Google Scholar 

  205. Zhang Y-D, Sharif M, Akram T (2021) Pixels to classes: intelligent learning framework for multiclass skin lesion localization and classification. Comput Electric Eng 90:106956

    Article  Google Scholar 

  206. Qasim M, Lodhi HMJ, Nazir M, Javed K, Rubab S, Din A, Habib U (2021) Automated design for recognition of blood cells diseases from hematopathology using classical features selection and ELM. Microscopy Res Tech 84:202–216

    Article  Google Scholar 

  207. Tahir ABT, Alhaisoni M, Khan JA, Nam Y, Wang S-H, Javed K (2021) Deep learning and improved particle swarm optimization based multimodal brain tumor classification. CMC-Comput Mater Continua 68:1099–1116

    Article  Google Scholar 

  208. Akram T, Sharif M, Kadry S, Nam Y (2021) Computer decision support system for skin cancer localization and classification. CMC-Comput Mater Continua 68:1041–1064

    Article  Google Scholar 

  209. Mehmood A, Sharif M, Khan SA, Shaheen M, Saba T, Riaz N, Ashraf I (2020) Prosperous human gait recognition: an end-to-end system based on pre-trained CNN features selection. Multimed Tools Appl, pp. 1–21

  210. Hussain N, Sharif M, Khan SA, Albesher AA, Saba T, Armaghan A. (2020) A deep neural network and classical features based scheme for objects recognition: an application for machine inspection. Multimed Tools Appl,pp. 1–23

Download references

Acknowledgments

This work was supported by Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P0008703, The Competency Development Program for Industry Specialist) and also the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2021-2018-0-01799) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seungmin Rho.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11227-024-05973-6

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rehman, E., Haseeb-ud-Din, M., Malik, A.J. et al. RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. J Supercomput 78, 8890–8924 (2022). https://doi.org/10.1007/s11227-021-04188-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04188-3

Keywords

Navigation