skip to main content
10.1145/3551690.3551692acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicicmConference Proceedingsconference-collections
research-article

Evaluating Machine Learning Methods for Intrusion Detection in IoT

Published: 14 September 2022 Publication History

Abstract

Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 pandemic due to cyber physical digital transformation enabled through widespread deployment of low cost sensor embedded IoT devices in consumer and industrial IOT, as well as increase in computing power. Consequently, this adoption trend had led to 1.51 billion breaches on IoT devices during the first half of 2021 alone. This highlights the critical importance of being prepared for IoT vulnerabilities (IoT manufacturing and deployment sector) and attacks (malicious actors). In this respect machine learning (ML) especially deep learning (DL) strategies has emerged as the preferred methods to secure IoT devices from attacks. In this paper, we propose three deep learning algorithms for IoT intrusion detection based on mapping of IoT attacks to ML/DL methods. Our paper thus provides two contributions. First, we present a model that maps extant research on the application of ML/DL to specific IoT attacks. Second, through an optimal selection of the mapping, we present three algorithms (naïve Bayes, convolutional neural network and autoencoder) for detection of intrusion in IoT attacks. This provides a review of research opportunities and research gaps in the IoT IDS domain.

References

[1]
Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[2]
Vailshery, L. S. (2021, January 14). Internet of things spending worldwide 2023. Statista. Retrieved February 25, 2022, from https://www.statista.com/statistics/668996/worldwide expenditures-for-the-internet-of-things/
[3]
Error! Hyperlink reference not valid.).
[4]
Deogirikar, J., & Vidhate, A. (2017, February). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32-37). IEEE.
[5]
Gendreau, A. A., & Moorman, M. (2016, August). Survey of intrusion detection systems towards an end to end secure internet of things. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 84-90). IEEE.
[6]
Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 22-Jan-2021. [Online]. Available: https://www.statista.com/statistics/802690/worldwideconnected-devices-by-access-technology/.
[7]
https://www.iotworldtoday.com/author/callumcyrus/
[8]
Li, X., Liu, H., Wang, W., Zheng, Y., Lv, H., & Lv, Z. (2022). Big data analysis of the internet of things in the digital twins of smart city based on deep learning. Future Generation Computer Systems, 128, 167-177.
[9]
Susilo, B., & Sari, R. F. (2020). Intrusion detection in IoT networks using deep learning algorithm. Information, 11(5), 279.
[10]
Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE.
[11]
Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768
[12]
Gong, C., Lin, F., Gong, X., & Lu, Y. (2020). Intelligent cooperative edge computing in internet of things. IEEE Internet of Things Journal, 7(10), 9372-9382.
[13]
Al-Qaseemi, S. A., Almulhim, H. A., Almulhim, M. F., & Chaudhry, S. R. (2016, December). IoT architecture challenges and issues: Lack of standardization. In 2016 Future technologies conference (FTC) (pp. 731-738). IEEE.
[14]
Velliangiri, S., & Kasaraneni, K. K. (2020). Machine Learning and Deep Learning in Cyber Security for IoT. In ICDSMLA 2019 (pp. 975-981). Springer, Singapore.
[15]
Suryanegara, M., Prasetyo, D. A., Andriyanto, F., & Hayati, N. (2019). A 5-step framework for measuring the quality of experience (QoE) of Internet of Things (IoT) services. IEEE Access, 7, 175779-175792.
[16]
Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi.Internet of things security: A survey. Journal of Network and Computer Applications, 88:10–28, 2017.
[17]
Viraaji Mothukuri, Prachi Khare, Reza M Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Gautam Srivastava. Federated learning-based anomaly detection for iot security attacks. IEEE Internet of Things Journal, 2021.
[18]
https://www.iso.org/standard/71885.html
[19]
Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016, August). Internet of Things (IoT): Taxonomy of security attacks. In 2016 3rd International Conference on Electronic Design (ICED) (pp. 321-326). IEEE.
[20]
Jean Caminha, Angelo Perkusich, and Mirko Perkusich. A smart trust management method to detect on-off at- tacks in the internet of things. Security and Communi- cation Networks, 2018, 2018.
[21]
Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.
[22]
Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A. and Choo, K.K.R., (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), pp.314-323.
[23]
Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 9(20), 4396.
[24]
Albulayhi, K., Smadi, A. A., Sheldon, F. T., & Abercrombie, R. K. (2021). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 21(19), 6432.
[25]
Li, P., & Zhang, Y. (2019, June). A novel intrusion detection method for internet of things. In 2019 Chinese Control And Decision Conference (CCDC) (pp. 4761-4765).
[26]
Bedi, P., Mewada, S., Vatti, R. A., Singh, C., Dhindsa, K. S., Ponnusamy, M., & Sikarwar, R. (2021). Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocessors and Microsystems, 82, 103814.
[27]
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, 21954-21961.
[28]
Vani, R. (2017). Towards efficient intrusion detection using deep learning techniques: a review. Int J Adv Res Comput Commun Eng ISO, 3297, 2007.
[29]
D. Stiawan et al., "Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network," in IEEE Access, vol. 9, pp. 116475-116484, 2021.
[30]
Wehbi, K., Hong, L., Al-salah, T., & Bhutta, A. A. (2019, April). A survey on machine learning based detection on DDoS attacks for IoT systems. In 2019 SoutheastCon (pp. 1-6). IEEE.
[31]
Zhu, J., Huo, L., Ansari, M. D., & Ikbal, M. A. (2021). Research on Data Security Detection Algorithm in IoT Based on K-means. Scalable Computing: Practice and Experience, 22(2), 149-159.black holeattack
[32]
S. Kaplantzis, A. Shilton, N. Mani, and Y. Sekercioglu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines,” in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on, Dec 2007, pp. 335–340.
[33]
Mat, S. R. T., Ab Razak, M. F., Kahar, M. N. M., Arif, J. M., & Firdaus, A. (2021). A Bayesian probability model for Android malware detection. ICT Express.
[34]
Chen, C. M., Wang, S. H., Wen, D. W., Lai, G. H., & Sun, M. K. (2019, October). Applying convolutional neural network for malware detection. In 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) (pp. 1-5). IEEE.
[35]
Lantz, B. (2019). Machine learning with R: expert techniques for predictive modeling. Packt publishing ltd.

Cited By

View all
  • (2024)Elevating IDS Capabilities: The Convergence of SVM, Deep Learning, and RFECV in Network Security2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493239(1-16)Online publication date: 22-Feb-2024
  • (2024)Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms2024 International Conference on Data Science and Its Applications (ICoDSA)10.1109/ICoDSA62899.2024.10652225(117-121)Online publication date: 10-Jul-2024

Index Terms

  1. Evaluating Machine Learning Methods for Intrusion Detection in IoT

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICICM '22: Proceedings of the 12th International Conference on Information Communication and Management
    July 2022
    105 pages
    ISBN:9781450396493
    DOI:10.1145/3551690
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 September 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Deep learning
    2. Intrusion detection systems
    3. IoT attacks
    4. IoT vulnerabilities

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICICM 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)45
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Elevating IDS Capabilities: The Convergence of SVM, Deep Learning, and RFECV in Network Security2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493239(1-16)Online publication date: 22-Feb-2024
    • (2024)Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms2024 International Conference on Data Science and Its Applications (ICoDSA)10.1109/ICoDSA62899.2024.10652225(117-121)Online publication date: 10-Jul-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media