ABSTRACT
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 pandemic due to cyber physical digital transformation enabled through widespread deployment of low cost sensor embedded IoT devices in consumer and industrial IOT, as well as increase in computing power. Consequently, this adoption trend had led to 1.51 billion breaches on IoT devices during the first half of 2021 alone. This highlights the critical importance of being prepared for IoT vulnerabilities (IoT manufacturing and deployment sector) and attacks (malicious actors). In this respect machine learning (ML) especially deep learning (DL) strategies has emerged as the preferred methods to secure IoT devices from attacks. In this paper, we propose three deep learning algorithms for IoT intrusion detection based on mapping of IoT attacks to ML/DL methods. Our paper thus provides two contributions. First, we present a model that maps extant research on the application of ML/DL to specific IoT attacks. Second, through an optimal selection of the mapping, we present three algorithms (naïve Bayes, convolutional neural network and autoencoder) for detection of intrusion in IoT attacks. This provides a review of research opportunities and research gaps in the IoT IDS domain.
- Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. 2016 14th Annual Conference on Privacy, Security and Trust (PST). doi:10.1109/pst.2016.7906930.Google ScholarCross Ref
- Vailshery, L. S. (2021, January 14). Internet of things spending worldwide 2023. Statista. Retrieved February 25, 2022, from https://www.statista.com/statistics/668996/worldwide expenditures-for-the-internet-of-things/Google Scholar
- Error! Hyperlink reference not valid.).Google Scholar
- Deogirikar, J., & Vidhate, A. (2017, February). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32-37). IEEE.Google Scholar
- Gendreau, A. A., & Moorman, M. (2016, August). Survey of intrusion detection systems towards an end to end secure internet of things. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 84-90). IEEE.Google Scholar
- Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 22-Jan-2021. [Online]. Available: https://www.statista.com/statistics/802690/worldwideconnected-devices-by-access-technology/.Google Scholar
- https://www.iotworldtoday.com/author/callumcyrus/Google Scholar
- Li, X., Liu, H., Wang, W., Zheng, Y., Lv, H., & Lv, Z. (2022). Big data analysis of the internet of things in the digital twins of smart city based on deep learning. Future Generation Computer Systems, 128, 167-177.Google Scholar
- Susilo, B., & Sari, R. F. (2020). Intrusion detection in IoT networks using deep learning algorithm. Information, 11(5), 279.Google Scholar
- Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE.Google Scholar
- Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768Google Scholar
- Gong, C., Lin, F., Gong, X., & Lu, Y. (2020). Intelligent cooperative edge computing in internet of things. IEEE Internet of Things Journal, 7(10), 9372-9382.Google Scholar
- Al-Qaseemi, S. A., Almulhim, H. A., Almulhim, M. F., & Chaudhry, S. R. (2016, December). IoT architecture challenges and issues: Lack of standardization. In 2016 Future technologies conference (FTC) (pp. 731-738). IEEE.Google Scholar
- Velliangiri, S., & Kasaraneni, K. K. (2020). Machine Learning and Deep Learning in Cyber Security for IoT. In ICDSMLA 2019 (pp. 975-981). Springer, Singapore.Google Scholar
- Suryanegara, M., Prasetyo, D. A., Andriyanto, F., & Hayati, N. (2019). A 5-step framework for measuring the quality of experience (QoE) of Internet of Things (IoT) services. IEEE Access, 7, 175779-175792.Google Scholar
- Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi.Internet of things security: A survey. Journal of Network and Computer Applications, 88:10–28, 2017.Google ScholarDigital Library
- Viraaji Mothukuri, Prachi Khare, Reza M Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Gautam Srivastava. Federated learning-based anomaly detection for iot security attacks. IEEE Internet of Things Journal, 2021.Google Scholar
- https://www.iso.org/standard/71885.htmlGoogle Scholar
- Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016, August). Internet of Things (IoT): Taxonomy of security attacks. In 2016 3rd International Conference on Electronic Design (ICED) (pp. 321-326). IEEE.Google ScholarCross Ref
- Jean Caminha, Angelo Perkusich, and Mirko Perkusich. A smart trust management method to detect on-off at- tacks in the internet of things. Security and Communi- cation Networks, 2018, 2018.Google Scholar
- Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.Google Scholar
- Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A. and Choo, K.K.R., (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), pp.314-323.Google Scholar
- Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 9(20), 4396.Google ScholarCross Ref
- Albulayhi, K., Smadi, A. A., Sheldon, F. T., & Abercrombie, R. K. (2021). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 21(19), 6432.Google Scholar
- Li, P., & Zhang, Y. (2019, June). A novel intrusion detection method for internet of things. In 2019 Chinese Control And Decision Conference (CCDC) (pp. 4761-4765).Google Scholar
- Bedi, P., Mewada, S., Vatti, R. A., Singh, C., Dhindsa, K. S., Ponnusamy, M., & Sikarwar, R. (2021). Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocessors and Microsystems, 82, 103814.Google Scholar
- Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, 21954-21961.Google Scholar
- Vani, R. (2017). Towards efficient intrusion detection using deep learning techniques: a review. Int J Adv Res Comput Commun Eng ISO, 3297, 2007.Google Scholar
- D. Stiawan et al., "Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network," in IEEE Access, vol. 9, pp. 116475-116484, 2021, doi: 10.1109/ACCESS.2021.3105517.Google Scholar
- Wehbi, K., Hong, L., Al-salah, T., & Bhutta, A. A. (2019, April). A survey on machine learning based detection on DDoS attacks for IoT systems. In 2019 SoutheastCon (pp. 1-6). IEEE.Google Scholar
- Zhu, J., Huo, L., Ansari, M. D., & Ikbal, M. A. (2021). Research on Data Security Detection Algorithm in IoT Based on K-means. Scalable Computing: Practice and Experience, 22(2), 149-159.black holeattackGoogle Scholar
- S. Kaplantzis, A. Shilton, N. Mani, and Y. Sekercioglu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines,” in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on, Dec 2007, pp. 335–340.Google Scholar
- Mat, S. R. T., Ab Razak, M. F., Kahar, M. N. M., Arif, J. M., & Firdaus, A. (2021). A Bayesian probability model for Android malware detection. ICT Express.Google Scholar
- Chen, C. M., Wang, S. H., Wen, D. W., Lai, G. H., & Sun, M. K. (2019, October). Applying convolutional neural network for malware detection. In 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) (pp. 1-5). IEEE.Google ScholarCross Ref
- Lantz, B. (2019). Machine learning with R: expert techniques for predictive modeling. Packt publishing ltd.Google Scholar
Index Terms
- Evaluating Machine Learning Methods for Intrusion Detection in IoT
Recommendations
Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT
GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023The Internet of Things (IoT) has brought about unprecedented connectivity and convenience in our daily lives, but with this newfound interconnectedness comes the threat of cyber-attacks. With ever-increasing IoT devices being connected to the internet, ...
Beholder – A CEP-based intrusion detection and prevention systems for IoT environments
AbstractIoT devices are vulnerable to security threats. The connectivity among such devices presents opportunities for cybercriminals to perform different types of attacks. In IoT, application layer protocols play an important role. They form ...
Intrusion detection systems for IoT-based smart environments: a survey
One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a technology for building smart environments. Security and privacy are ...
Comments