An Efficient Iot Network Intrusion Detection And Prevention System JARVIS – Just A Rather Very Intelligent System.

Authors

  • Shanthakumar H. C., Doddegowda B. J.

Keywords:

Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Intrusion Detection And Prevention System (IDPS), Intrusion Detection System (IDS), Intrusion Prevention System (IPS).

Abstract

Given the race to find the best technique that suits and protects all Internet of Things (IoT) wireless devices, all around the world are in a quest to develop Intrusion Detection And Prevention Systems (IDPS). This has been led by a huge change from the traditional world shifting to the smart and intelligent world empowered and made possible by IoT devices and Artificial Intelligence and Machine Learning techniques (ML). The scope of security is much a relevant need but is challenged and limited by the computation memory and processing hardware which are typically small or micro in most heterogeneous IoT devices. Hence Machine Learning (ML) algorithms come into play while constructing an effective IDPS that treats every threat by detecting and preventing it from attacking the IoT devices and their network. In the proposed paper we show how the Intrusion Detection System (IDS) can be developed from both supervised and unsupervised machine learning techniques which addresses both static and dynamic intrusion attacks by using the KDD-CUP dataset and prevent them using the different cryptographic techniques that can perform well in small processing environments. Afterward in the results, it has been shown that among the algorithms of ML Support Vector Machine (SVM), Random Forest (RF), Linear Discriminant Analysis (LDA), Classification and Regression Trees (CART), RF gives the best values for the F1 score, recall, accuracy, and other evaluation metrics. Then using the Java Springs framework work we have built the IDPS which is integrated with the smart IDS thus forming an IDPS that safeguards the network and devices from the generic attacks which are known and unknown intrusions assuming the intruder is   based on the server.

Downloads

Download data is not yet available.

References

P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti and T. -H. Kim, "Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey," in IEEE Access, vol. 10, pp. 121173- 121192, 2022, doi: 10.1109/ACCESS.2022.3220622.

S. Subbiah, K. S. M. Anbananthen, S. Thangaraj, S. Kannan and D.Chelliah, "Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm," in Journal of Communications and Networks, vol. 24, no.2, pp. 264-273, April 2022, doi: 10.23919/JCN.2022.000002.

E. Kabir, J. Hu, H. Wang, and G. Zhuo, “A novel statistical technique for intrusion detection systems,” Future Gener. Comput. Syst., vol. 79,pp. 303–318, 2018.

Hasan Alkahtani and Theyazn H.H. Aldhyani. “Intrusion Detection System to Advanced IOT Infrastructure Based Deep Learning Algorithm”,2021.

B. Abhale and S. S. Manivannan, “Supervised machine learning classification algorithmic approach for finding anomaly type of intrusion detection in wireless sensor network,” Opt. Memory Neural Netw., vol. 29, no. 3, pp. 244–256, 2020.

W. Seo and W. Pak, "Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning," in PF De Araujo-Filho, AJ Pinheiro, G Kaddoum, DR Campelo, FL Soares,” An Efficient Intrusion Prevention System for CAN: Hindering Cyber-Attacks With a Low-Cost Platform”, IEEE Internet of Things Journal, 2022.

S. Park, S. Kwon, Y. Park, D. Kim and I. You, "Session Management for Security Systems in 5G Standalone Network," in IEEE Access, vol.10, pp. 73421-73436, 2022, doi: 10.1109/ACCESS.2022.3187053.

R. Vijayanand, D. Devaraj, and B. Kannapiran, “Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection,” Comput. Secur., vol. 77, pp. 304–314, 2018.

M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet Things, vol. 7, 2019.

T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance analysis of machine learning algorithms in intrusion detection system: A review,” in Procedia Comput. Sci., vol. 171, pp. 1251–1260, 2020.

Omarov, M. Asqar, R. Sadybekov, T. Koishiyeva, A. Bazarbayeva and Y. Uxikbayev, "IoT Network Intrusion Detection: A Brief Review," 2022 International Conference on Smart Information Systems and Technologies (SIST), Nur-Sultan, Kazakhstan, 2022, pp. 1-5.

Roopak, Monika, Gui Yun Tian, and Jonathon Chambers. "An intrusion detection system against DDoS attacks in IoT networks." In 2020 10th annual Computing and Communication Workshop and Conference (CCWC), pp. 0562-0567. IEEE, 2020.

P. Illy, G. Kaddoum, K. Kaur and S. Garg, "ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks," in IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 772-783, June 2022, doi: 10.1109/TNSM.2022.3141942.

Vergütz, B. V. d. Santos, B. Kantarci and M. Nogueira, "Data Instrumentation From IoT Network Traffic as Support for Security Management," in IEEE Transactions on Network and Service Management, vol. 20, no. 2, pp. 1392-1404, June 2023, doi:

10.1109/TNSM.2022.3233673. [16] Chaitra, Y.L., Dinesh, R. et al. “Deep-CNNTL: Text Localization from Natural Scene Images Using Deep Convolution Neural Network with Transfer Learning”, Arab J Sci Eng, 2022.

Chaitra, Y.L., Dinesh, R. “An Impact of Radon Transforms and Filtering Techniques for Text Localization in Natural Scene Text Images”, ICT with Intelligent Applications. Smart Innovation, Systems and Technologies, vol 248. Springer, 2022.

R. Latha and R. M. Bommi, "Hybrid CatBoost Regression model based Intrusion Detection System in IoT-Enabled Networks," 2023 9th International Conference on Electrical Energy Systems (ICEES), Chennai, India, 2023, pp. 264-269.

Ioulianou, Philokypros P., Vassilios G. Vassilakis, and Siamak F.Shahandashti. "A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks." Journal of Cybersecurity and Privacy 2, no. 1 (2022): 124-153.

Elijah M. Maseno, Zenghui Wang and Hongyan Xing “A Systematic Review on Hybrid Intrusion Detection System”, Wiely Publictions,2022, https://doi.org/10.1155/2022/9663052IEEE Access, vol. 9, pp. 46386-46397, 2021, doi: 10.1109/ACCESS.2021.3066620.

Zhang, Yunpeng & Gandhi, Yash & Li, Zhixia (Richard) & Xiao, Zhiwen. (2022). Improving the Classification Effectiveness of Network Intrusion Detection Using Ensemble Machine Learning Techniques and Deep Neural Networks. 117-123. 10.1109/IDSTA55301.2022.9923205.

M. S. Hossain et al., "Performance Evaluation of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms," 2023 4th International Conference on Big Data Analytics and Practices (IBDAP), Bangkok, Thailand, 2023, pp. 1-6, doi: 10.1109/IBDAP58581.2023.10271964

Naaz, Sameena. "Detection of phishing in the internet of things using machine learning approach." International Journal of Digital Crime and Forensics (IJDCF) 13, no. 2 (2021): 1-15.

Noman Mazhar; Rosli Salleh; Muhammad Zeeshan; M. Muzaffar Hameed; Nauman Khan, R-IDPS: Real-time SDN based IDPS system for IoT security, 2021 IEEE 18th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET).

S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a lightweight intrusion detection system for the Internet of things,” IEEE Access, vol. 7, pp. 42 450–42 471, 2019. [26] F. Zhang, Y. Wang, S. Liu, and H. Wang, “Decision-based evasion attacks on tree ensemble classifiers,” World Wide Web, vol. 23, no. 5, pp.2957–2977, 2020.

S. Huang, Y. Lu, W. Wang, and K. Sun, “Multi-scale guided feature extraction and classification algorithm for hyperspectral images,” Scientific Reports, vol. 11, no. 1, 2021.

P. Sinha, V. K. Jha, A. K. Rai, and B. Bhushan, “Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey," in Proc.IEEE ICSPC, 2017.

Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A global hybrid intrusion detection system for wireless sensor networks,” Procedia Comput. Sci., vol. 52, pp. 1047–1052, 2015

S. Sridevi, S. Parthasarathy, and S. Rajaram, “An effective prediction system for time series data using pattern matching algorithms,” Int. J. Ind. Eng.: Theory Appl. Pract., vol. 25, no. 2, pp. 123–136, 2018.

M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009, pp. 1-6, doi: 10.1109/CISDA.2009.5356528.

Bachar, Anouar, Noureddine El Makhfi, and Omar EL Bannay. "Machine learning for network intrusion detection based on SVM binary classification model." Advances in Science, Technology and Engineering Systems Journal 5.4 (2020): 638-644.

M. Belouch, S. El, M. Idhammad, “A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection”. International Journal of Advanced Computer Science and Applications, 8(6), 2017. doi:10.14569/ijacsa.2017.080651.

Downloads

Published

09.07.2024

How to Cite

Shanthakumar H. C. (2024). An Efficient Iot Network Intrusion Detection And Prevention System JARVIS – Just A Rather Very Intelligent System. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 851 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6565

Issue

Section

Research Article