Two-level machine learning driven intrusion detection model for IoT environments

被引:2
|
作者
Malhi, Yuvraj Singh [1 ]
Shekhawat, Virendra Singh [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Elect & Elect, Pilani, Rajasthan, India
[2] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, New Acad Block 6121-R, Pilani, Rajasthan, India
关键词
deep learning; machine learning; intrusion detection system; IDS; random forest; network security; internet of things; IoT; denial-of-service; DoS; soft computing; modular detection; IoT security;
D O I
10.1504/IJICS.2023.132708
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a consequence of the growing number of cyberattacks on IoT devices, the need for defences like intrusion detection systems (IDSs) has significantly risen. But current IDS implementations for IoT are complex to design, difficult to incorporate, platform-specific, and limited by IoT device's resource constraints. This paper proposes a deployment-ready network IDS for IoT that overcomes the shortcomings of the existing IDS solutions and can detect 22 types of attacks. The proposed IDS provide the flexibility to work in multiple modes as per IoT device computing power, made possible via development of three machine learning-based IDS modules. The intrusion detection task has been divided at two levels: at edge devices (using two light modules based on neural network and decision tree) and at centralised controller (using a random forest and XGBoost combination). To ensure the best working tandem of developed modules, different IDS deployment strategies are also given.
引用
收藏
页码:229 / 261
页数:34
相关论文
共 50 条
  • [11] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [12] Two-Level Attention Model of Representation Learning for Fraud Detection
    Cao, Ruihao
    Liu, Guanjun
    Xie, Yu
    Jiang, Changjun
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (06) : 1291 - 1301
  • [13] A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
    Vitorino, Joao
    Andrade, Rui
    Praca, Isabel
    Sousa, Orlando
    Maia, Eva
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 191 - 207
  • [14] Machine Learning Based Intrusion Detection Systems for IoT Applications
    Verma, Abhishek
    Ranga, Virender
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (04) : 2287 - 2310
  • [15] Towards Machine Learning Based Intrusion Detection in IoT Networks
    Islam, Nahida
    Farhin, Fahiba
    Sultana, Ishrat
    Kaiser, M. Shamim
    Rahman, Md. Sazzadur
    Mahmud, Mufti
    Hosen, A. S. M. Sanwar
    Cho, Gi Hwan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (02): : 1801 - 1821
  • [16] Machine learning and datamining methods for hybrid IoT intrusion detection
    El Ghazi, Abdellatif
    Rachid, Ait Moulay
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 80 - 85
  • [17] TinyIDS - An IoT Intrusion Detection System by Tiny Machine Learning
    Fusco, Pietro
    Rimoli, Gennaro Pio
    Ficco, Massimo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS-ICCSA 2024 WORKSHOPS, PT II, 2024, 14816 : 71 - 82
  • [18] Towards Machine Learning Based IoT Intrusion Detection Service
    Mohamed, TagyAldeen
    Otsuka, Takanobu
    Ito, Takayuki
    RECENT TRENDS AND FUTURE TECHNOLOGY IN APPLIED INTELLIGENCE, IEA/AIE 2018, 2018, 10868 : 580 - 585
  • [19] Machine Learning Based Intrusion Detection Systems for IoT Applications
    Abhishek Verma
    Virender Ranga
    Wireless Personal Communications, 2020, 111 : 2287 - 2310
  • [20] Machine Learning for Forensic Occupancy Detection in IoT Environments
    Deconto, Guilherme Dall'Agnol
    Zorzo, Avelino Francisco
    Dalalana, Daniel Bertoglio
    Oliveira, Edson, Jr.
    Lunardi, Roben Castagna
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, WORLDCIST 2024, 2024, 985 : 102 - 114