An Efficient Flow-Based Anomaly Detection System for Enhanced Security in IoT Networks

被引:1
|
作者
Mutambik, Ibrahim [1 ]
机构
[1] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, Riyadh 11451, Saudi Arabia
关键词
IoT security; behavioral-based intrusion detection; flow-based analysis; anomaly detection; network traffic monitoring;
D O I
10.3390/s24227408
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The growing integration of Internet of Things (IoT) devices into various sectors like healthcare, transportation, and agriculture has dramatically increased their presence in everyday life. However, this rapid expansion has exposed new vulnerabilities within computer networks, creating security challenges. These IoT devices, often limited by their hardware constraints, lack advanced security features, making them easy targets for attackers and compromising overall network integrity. To counteract these security issues, Behavioral-based Intrusion Detection Systems (IDS) have been proposed as a potential solution for safeguarding IoT networks. While Behavioral-based IDS have demonstrated their ability to detect threats effectively, they encounter practical challenges due to their reliance on pre-labeled data and the heavy computational power they require, limiting their practical deployment. This research introduces the IoT-FIDS (Flow-based Intrusion Detection System for IoT), a lightweight and efficient anomaly detection framework tailored for IoT environments. Instead of employing traditional machine learning techniques, the IoT-FIDS focuses on identifying unusual behaviors by examining flow-based representations that capture standard device communication patterns, services used, and packet header details. By analyzing only benign traffic, this network-based IDS offers a streamlined and practical approach to securing IoT networks. Our experimental results reveal that the IoT-FIDS can accurately detect most abnormal traffic patterns with minimal false positives, making it a feasible security solution for real-world IoT implementations.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Efficient Approach for Anomaly Detection in IoT Using System Calls
    Shamim, Nouman
    Asim, Muhammad
    Baker, Thar
    Awad, Ali Ismail
    SENSORS, 2023, 23 (02)
  • [32] Flow-based Physical Security
    Al-Fedaghi, Sabah
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 239 - 250
  • [33] Analysis of flow-based anomaly detection using Shannon's entropy
    Komazec, Teodora
    Gajin, Slavko
    2019 27TH TELECOMMUNICATIONS FORUM (TELFOR 2019), 2019, : 41 - 44
  • [34] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Li, Zeyi
    Wang, Pan
    Wang, Zixuan
    Zhan, De-chuan
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 58 - 71
  • [35] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Zeyi LI
    Pan WANG
    Zixuan WANG
    Chinese Journal of Electronics, 2024, 33 (01) : 58 - 71
  • [36] A MULTI-LAYER PERCEPTRON APPROACH FOR FLOW-BASED ANOMALY DETECTION
    Van Efferen, Lennart
    Ali-Eldin, Amr M. T.
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [37] Correction: Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach
    Sultan Zavrak
    Murat Iskefiyeli
    Neural Computing and Applications, 2023, 35 : 18091 - 18091
  • [38] Flow-based anomaly detection using semi-supervised learning
    Jadidi, Zahra
    Muthukkumarasamy, Vallipuram
    Sithirasenan, Elankayer
    Singh, Kalvinder
    2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,
  • [39] Improving network anomaly detection via selective flow-based sampling
    Androulidakis, G.
    Papavassiliou, S.
    IET COMMUNICATIONS, 2008, 2 (03) : 399 - 409
  • [40] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793