skip to main content
10.1145/3325917.3325939acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisdmConference Proceedingsconference-collections
research-article

Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection

Authors Info & Claims
Published:06 April 2019Publication History

ABSTRACT

Internet of Things (IoT) is a global network that connects various types of objects "things" via internet. It becomes a core technology for various applications and more and more embedded within our daily lives and businesses. As the technology grows and evolves a number of issues will arise and be focused on in IoT, Security is one of the central issues in IoT in the last decade. However, most of today's IoT intrusion detection systems suffer from high false alarms rate with moderate accuracy and detection rates when it's not able to detect all types of IoT intrusions correctly. To overcome this problem, hybrid techniques are used. In this paper, hybrid learning approach combining partitioning clustering techniques with Hidden Markov Model (HMM) is proposed. Experimental results show that the proposed approach using K-Medoids has improved the detection rate as well as decreased the false positive rate.

References

  1. Shanzhi Chen, Hui Xu, Dake Liu, Bo Hu, Hucheng Wang," A Vision of IoT: Applications, Challenges, and Opportunities with China Perspective", IEEE Internet of Things Journal, Vol. 1, No. 4, August 2014.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Patcha and J-M Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Network, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Al-Jarrah, O. Y., Alhussein, O., Yoo, P. D., Muhaidat, S., Taha, K., & Kim, K. (2016). Data randomization and cluster-based partitioning for botnet intrusion detection. IEEE transactions on cybernetics, 46(8), 1796--1806 Hidden Markov Models." International Journal of Computer Science Issues (IJCSI) 15.5 (2018): 12300.Google ScholarGoogle ScholarCross RefCross Ref
  4. Corrales, D. C., Corrales, J. C., Sanchis, A., & Ledezma, A. (2016, October). Sequential classifiers for network intrusion detection based on data selection process. In Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on (pp. 001827--001832). IEEE.Google ScholarGoogle Scholar
  5. Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78, 13--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Muniyandi, A. P., Rajeswari, R., & Rajaram, R. (2012). Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering, 30, 174--182Google ScholarGoogle Scholar
  7. R. Chitrakar, H. Chuanhe "Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Naïve Bayes Classification" In Proceedings of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM); (2012), pp. 1--5Google ScholarGoogle Scholar
  8. Setiawan, Bambang, Supeno Djanali, and Tohari Ahmad. "A Study on Intrusion Detection Using Centroid-Based Classification." Procedia Computer Science 124 (2017): 672--681.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Au, Wai-Ho, et al. "Attribute clustering for grouping, selection, and classification of gene expression data." IEEE/ACM transactions on computational biology and bioinformatics 2.2 (2005): 83--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Syarif, Iwan, Adam Prugel-Bennett, and Gary Wills. "Unsupervised clustering approach for network anomaly detection." International Conference on Networked Digital Technologies. Springer, Berlin, Heidelberg, 2012.Google ScholarGoogle Scholar
  11. Z. Ghahramani, "An introduction to hidden Markov models and Bayesian networks," International Journal of Pattern Recognition and Artificial Intelligence, vol. 15, no. 1, pp. 9--42, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. E. Baum and T. Petrie, "Statistical inference for probabilistic functions of finite state markov chains," in The AnnaGoogle ScholarGoogle Scholar
  13. Sulaiman Alhaidari, Ali Alharbi and Mohamed Zohdy. "Detecting Distributed Denial of Service Attacks Using Hidden Markov Models." International Journal of Computer Science Issues (IJCSI) 15.5 (2018): 12300.Google ScholarGoogle Scholar
  14. Pa, Yin Minn Pa, et al. "Iotpot: A novel honeypot for revealing current iot threats." Journal of Information Processing 24.3 (2016): 522--533.Google ScholarGoogle ScholarCross RefCross Ref
  15. Arndt, Daniel. HOW TO: Calculating Flow Statistics Using NetMate. 4 Dec. 2016, dan.arndt.ca/nims/calculating-flow-statistics-using-netmate/.Google ScholarGoogle Scholar
  16. Alharbi, A., Alhaidari, S., Zohdy, M."Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models" International Journal of Computer and Information Technology (2018).Google ScholarGoogle Scholar
  17. Alhaidari, Sulaiman, and Zohdy, Mohamed. " feature pruning method for hidden markov model-based anomaly detection: a comparison of performance." Jordanian Journal of Computers and Information Technology (JJCIT) 4.3 (2018): 175--184.Google ScholarGoogle Scholar

Index Terms

  1. Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICISDM '19: Proceedings of the 2019 3rd International Conference on Information System and Data Mining
      April 2019
      251 pages
      ISBN:9781450366359
      DOI:10.1145/3325917

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 April 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader