skip to main content
10.1145/3551690.3551692acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicicmConference Proceedingsconference-collections
research-article

Evaluating Machine Learning Methods for Intrusion Detection in IoT

Published:14 September 2022Publication History

ABSTRACT

Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 pandemic due to cyber physical digital transformation enabled through widespread deployment of low cost sensor embedded IoT devices in consumer and industrial IOT, as well as increase in computing power. Consequently, this adoption trend had led to 1.51 billion breaches on IoT devices during the first half of 2021 alone. This highlights the critical importance of being prepared for IoT vulnerabilities (IoT manufacturing and deployment sector) and attacks (malicious actors). In this respect machine learning (ML) especially deep learning (DL) strategies has emerged as the preferred methods to secure IoT devices from attacks. In this paper, we propose three deep learning algorithms for IoT intrusion detection based on mapping of IoT attacks to ML/DL methods. Our paper thus provides two contributions. First, we present a model that maps extant research on the application of ML/DL to specific IoT attacks. Second, through an optimal selection of the mapping, we present three algorithms (naïve Bayes, convolutional neural network and autoencoder) for detection of intrusion in IoT attacks. This provides a review of research opportunities and research gaps in the IoT IDS domain.

References

  1. Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. 2016 14th Annual Conference on Privacy, Security and Trust (PST). doi:10.1109/pst.2016.7906930.Google ScholarGoogle ScholarCross RefCross Ref
  2. Vailshery, L. S. (2021, January 14). Internet of things spending worldwide 2023. Statista. Retrieved February 25, 2022, from https://www.statista.com/statistics/668996/worldwide expenditures-for-the-internet-of-things/Google ScholarGoogle Scholar
  3. Error! Hyperlink reference not valid.).Google ScholarGoogle Scholar
  4. Deogirikar, J., & Vidhate, A. (2017, February). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32-37). IEEE.Google ScholarGoogle Scholar
  5. Gendreau, A. A., & Moorman, M. (2016, August). Survey of intrusion detection systems towards an end to end secure internet of things. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 84-90). IEEE.Google ScholarGoogle Scholar
  6. Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 22-Jan-2021. [Online]. Available: https://www.statista.com/statistics/802690/worldwideconnected-devices-by-access-technology/.Google ScholarGoogle Scholar
  7. https://www.iotworldtoday.com/author/callumcyrus/Google ScholarGoogle Scholar
  8. Li, X., Liu, H., Wang, W., Zheng, Y., Lv, H., & Lv, Z. (2022). Big data analysis of the internet of things in the digital twins of smart city based on deep learning. Future Generation Computer Systems, 128, 167-177.Google ScholarGoogle Scholar
  9. Susilo, B., & Sari, R. F. (2020). Intrusion detection in IoT networks using deep learning algorithm. Information, 11(5), 279.Google ScholarGoogle Scholar
  10. Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE.Google ScholarGoogle Scholar
  11. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768Google ScholarGoogle Scholar
  12. Gong, C., Lin, F., Gong, X., & Lu, Y. (2020). Intelligent cooperative edge computing in internet of things. IEEE Internet of Things Journal, 7(10), 9372-9382.Google ScholarGoogle Scholar
  13. Al-Qaseemi, S. A., Almulhim, H. A., Almulhim, M. F., & Chaudhry, S. R. (2016, December). IoT architecture challenges and issues: Lack of standardization. In 2016 Future technologies conference (FTC) (pp. 731-738). IEEE.Google ScholarGoogle Scholar
  14. Velliangiri, S., & Kasaraneni, K. K. (2020). Machine Learning and Deep Learning in Cyber Security for IoT. In ICDSMLA 2019 (pp. 975-981). Springer, Singapore.Google ScholarGoogle Scholar
  15. Suryanegara, M., Prasetyo, D. A., Andriyanto, F., & Hayati, N. (2019). A 5-step framework for measuring the quality of experience (QoE) of Internet of Things (IoT) services. IEEE Access, 7, 175779-175792.Google ScholarGoogle Scholar
  16. Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi.Internet of things security: A survey. Journal of Network and Computer Applications, 88:10–28, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Viraaji Mothukuri, Prachi Khare, Reza M Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Gautam Srivastava. Federated learning-based anomaly detection for iot security attacks. IEEE Internet of Things Journal, 2021.Google ScholarGoogle Scholar
  18. https://www.iso.org/standard/71885.htmlGoogle ScholarGoogle Scholar
  19. Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016, August). Internet of Things (IoT): Taxonomy of security attacks. In 2016 3rd International Conference on Electronic Design (ICED) (pp. 321-326). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  20. Jean Caminha, Angelo Perkusich, and Mirko Perkusich. A smart trust management method to detect on-off at- tacks in the internet of things. Security and Communi- cation Networks, 2018, 2018.Google ScholarGoogle Scholar
  21. Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.Google ScholarGoogle Scholar
  22. Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A. and Choo, K.K.R., (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), pp.314-323.Google ScholarGoogle Scholar
  23. Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 9(20), 4396.Google ScholarGoogle ScholarCross RefCross Ref
  24. Albulayhi, K., Smadi, A. A., Sheldon, F. T., & Abercrombie, R. K. (2021). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 21(19), 6432.Google ScholarGoogle Scholar
  25. Li, P., & Zhang, Y. (2019, June). A novel intrusion detection method for internet of things. In 2019 Chinese Control And Decision Conference (CCDC) (pp. 4761-4765).Google ScholarGoogle Scholar
  26. Bedi, P., Mewada, S., Vatti, R. A., Singh, C., Dhindsa, K. S., Ponnusamy, M., & Sikarwar, R. (2021). Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocessors and Microsystems, 82, 103814.Google ScholarGoogle Scholar
  27. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, 21954-21961.Google ScholarGoogle Scholar
  28. Vani, R. (2017). Towards efficient intrusion detection using deep learning techniques: a review. Int J Adv Res Comput Commun Eng ISO, 3297, 2007.Google ScholarGoogle Scholar
  29. D. Stiawan et al., "Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network," in IEEE Access, vol. 9, pp. 116475-116484, 2021, doi: 10.1109/ACCESS.2021.3105517.Google ScholarGoogle Scholar
  30. Wehbi, K., Hong, L., Al-salah, T., & Bhutta, A. A. (2019, April). A survey on machine learning based detection on DDoS attacks for IoT systems. In 2019 SoutheastCon (pp. 1-6). IEEE.Google ScholarGoogle Scholar
  31. Zhu, J., Huo, L., Ansari, M. D., & Ikbal, M. A. (2021). Research on Data Security Detection Algorithm in IoT Based on K-means. Scalable Computing: Practice and Experience, 22(2), 149-159.black holeattackGoogle ScholarGoogle Scholar
  32. S. Kaplantzis, A. Shilton, N. Mani, and Y. Sekercioglu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines,” in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on, Dec 2007, pp. 335–340.Google ScholarGoogle Scholar
  33. Mat, S. R. T., Ab Razak, M. F., Kahar, M. N. M., Arif, J. M., & Firdaus, A. (2021). A Bayesian probability model for Android malware detection. ICT Express.Google ScholarGoogle Scholar
  34. Chen, C. M., Wang, S. H., Wen, D. W., Lai, G. H., & Sun, M. K. (2019, October). Applying convolutional neural network for malware detection. In 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) (pp. 1-5). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  35. Lantz, B. (2019). Machine learning with R: expert techniques for predictive modeling. Packt publishing ltd.Google ScholarGoogle Scholar

Index Terms

  1. Evaluating Machine Learning Methods for Intrusion Detection in IoT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICICM '22: Proceedings of the 12th International Conference on Information Communication and Management
      July 2022
      105 pages
      ISBN:9781450396493
      DOI:10.1145/3551690

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 September 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)94
      • Downloads (Last 6 weeks)17

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format