Securing the Internet of Things: A Machine Learning Approach to Mitigate DoS Threats with an Intrusion Detection System
Keywords:
Internet of Things, Cross-Layer IDS, DoS attacks, Hybrid IDS, Machine LearningAbstract
This study addresses the threat of Denial of Service (DoS) attacks within the Internet of Things (IoT) and introduces a Hybrid Intrusion Detection System (IDS) designed for detecting Cross-Layer DoS assaults. Comparative analysis with a single IDS reveals a substantial reduction in false positive rates. The Hybrid IDS integrates various machine learning algorithms to prevent overfitting or underfitting, functioning in two stages—Anomaly detection and Signature detection. The initial stage (Anomaly Detection) produces an Output of First Stage which becomes input to the Second Stage (Signature Detection). The Output of the Second Stage gives the final attack classes. Notably, the study creates an adapted dataset by simulating multiple assault environment in the NetSim Simulator, emphasizing the concurrent selection of the best feature set and critical feature using an innovative technique. Additionally, the research includes a comparative analysis of testing datasets under varying attacker nodes, network nodes, and processing time efficiency scenarios. This further validates the proposed Hybrid IDS's effectiveness in mitigating DoS attacks in the IoT.
Downloads
References
Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Valdés, J. F., & Luna-Valero, F. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 20(3), 816.
R. Qamar, B.A. Zardari, A.A. Arain, Z. Hussain, and A. Burdi, “A Comparative Study of Distributed Denial of Service Attacks on The Internet Of Things By Using Shallow Neural Network,” Quaid-E-Awam University Research Journal of Engineering, Science & Technology, Nawabshah., 20(01), 61-73, 2022.
K. Saranya, and A. Valarmathi, “A Comparative Study on Machine Learning based Cross Layer Security in Internet of Things (IoT),” IEEE , pp. 267-273, December, 2022. [International Conference on Automation, Computing and Renewable Systems (ICACRS,2022])
P. Bajaj, S. Mishra, and A. Paul, “Comparative Analysis of Stack-Ensemble-Based Intrusion Detection System for Single-Layer and Cross-layer DoS Attack Detection in IoT,” SN Computer Science, 4(5), 562, 2023.
P. Nimbalkar, and D. Kshirsagar, “Feature selection for intrusion detection system in Internet-of-Things (IoT).” ICT Express, 7(2), 177-181, 2021.
E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home IoT devices,” IEEE Internet of Things Journal, 6(5), 9042-9053, 2019.
T. Aliya, and E. Aiman, “A Survey on Recent Approaches in Intrusion Detection System in IoTs,” IEEE,[15th International Wireless Communications & Mobile Computing Conference (IWCMC).,2019].
N. Moustafa, B. Turnbull, and K.K.R. Choo, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” IEEE Internet of Things Journal, 6(3), 4815-4830, 2018.
Amouri, V.T. Alaparthy, and S.D. Morgera, “Cross layer-based intrusion detection based on network behavior for IoT,” IEEE, pp. 1-4 [19th Wireless and Microwave Technology Conference (WAMICON), April, 2018].
Amouri, S. D. Morgera, M. A. Bencherif, and R. Manthena, “A cross-layer, anomaly-based IDS for WSN and MANET,” Sensors, 18(2), 651, 2018.
E. Canbalaban, and S. Sen, “A cross-layer intrusion detection system for RPL-based Internet of Things.” In Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings 19, Springer International Publishing, pp. 214-227, 2020.
H.Y. Kwon, T. Kim, and K.M. Lee, “Advanced intrusion detection combining signature-based and behavior-based detection methods,” Electronics, 11(6), 867, 2022.
Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, “A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks,” Electronics, 8(11), 1210, 2019.
M. Malik, M. Dutta, and J. Granjal, “IoT-sentry: A cross-layer-based intrusion detection system in standardized Internet of Things,” IEEE Sensors Journal, 21(24), 28066-28076, 2021.
M. Sarhan, S. Layeghy, and M. Portmann, “Towards a standard feature set for network intrusion detection system datasets,” Mobile networks and applications, 1-14, 2022.
S. Sinha, A. Paul, “Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network,” Wireless Pers Commun 114, 835–851 (2020). https://doi.org/10.1007/s11277-020-07395-y
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.