IoT Wireless Intrusion Detection and Network Traffic Analysis

被引:12
|
作者
Ponnusamy, Vasaki [1 ]
Yichiet, Aun [1 ]
Jhanjhi, N. Z. [2 ]
Humayun, Mamoona [3 ]
Almufareh, Maram Fahhad [3 ]
机构
[1] Univ Tunku Abdul Rahman, Kampar 31900, Malaysia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
来源
关键词
IoT; machine learning; traffic features; IDS; KDD-CUP; NSL-KDD;
D O I
10.32604/csse.2022.018801
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless tech-nology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. How -ever, the number of network attacks in wireless networks that exploit such flex-ibilities in setting and tearing down networks has become very alarming. Perpetrators can launch attacks since there is no first line of defense in an ad hoc network setup besides the standard IEEE802.11 WPA2 authentication. One feasible countermeasure is to deploy intrusion detection systems at the edge of these ad hoc networks (Network-based IDS) or at the node level (Host-based IDS). The challenge here is that there is no readily available benchmark data available for IoT network traffic. Creating this benchmark data is very tedious as IoT can work on multiple platforms and networks, and crafting and labelling such dataset is very labor-intensive. This research aims to study the characteristics of existing datasets available such as KDD-Cup and NSL-KDD, and their suitabil-ity for wireless IDS implementation. We hypothesize that network features are parametrically different depending on the types of network and assigning weight dynamically to these features can potentially improve the subsequent threat clas-sifications. This paper analyses packet and flow features for the data packet cap -tured on a wireless network rather than a wired network. Combining domain heuristcs and early classification results, the paper had identified 19 header fields exclusive to wireless network that contain high information gain to be used as ML features in Wireless IDS.
引用
收藏
页码:865 / 879
页数:15
相关论文
共 50 条
  • [1] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy V.
    Yichiet A.
    Jhanjhi N.Z.
    Humayun M.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 865 - 879
  • [2] Intrusion Detection in IoT Network Traffic Using Markov Model
    Liu, I-Hsien
    Huang, Hsiao-Ching
    Lee, Meng-Huan
    Li, Jung-Shian
    SENSORS AND MATERIALS, 2024, 36 (03) : 1127 - 1134
  • [3] Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
    Ben Slimane, Jihane
    Abd-Elkawy, Eman H.
    Maqbool, Albia
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 2140 - 2149
  • [4] Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
    Rose, Joseph R.
    Swann, Matthew
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 409 - 415
  • [5] Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model
    Han Zhijie
    Wang Ruchuang
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 2072 - 2080
  • [6] Multivariate statistical analysis of network traffic for intrusion detection
    Kanaoka, A
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 472 - 476
  • [7] ACTIVE LEARNING FOR WIRELESS IOT INTRUSION DETECTION
    Yang, Kai
    Ren, Jie
    Zhu, Yanqiao
    Zhang, Weiyi
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 19 - 25
  • [8] Abnormal traffic detection for network intrusion detection
    Heo, YJ
    Ryu, KW
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 387 - 390
  • [9] Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
    Tao, Zhiqi
    Ruighaver, A. B.
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2513 - +
  • [10] Network traffic clustering for intrusion detection
    Arina, Nikishova
    Irina, Ananina
    Evgeny, Ananin
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 252 - 256