HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Things Network

被引:5
作者
Berguiga, Abdelwahed [1 ]
Harchay, Ahlem [1 ]
Massaoudi, Ayman [2 ]
机构
[1] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka, Saudi Arabia
[2] Univ Carthage, Higher Sch Commun, Mediatron Lab, Ariana, Tunisia
关键词
Routing protocols; Internet of Medical Things; Topology; Network topology; Denial-of-service attack; Peer-to-peer computing; Medical services; Computer crime; Convolutional neural networks; Routing; Deep learning (DL); intrusion detection system (IDS); routing protocol for low-power and lossy networks (RPL); Internet of Medical Things (IoMT); convolutional neural network (CNN); long short term memory neural network (LSTM); DDoS attacks;
D O I
10.1109/ACCESS.2025.3545918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of the Internet of Medical Things (IoMT) has improved medical examination behaviors in their accuracy, real-time capability, interconnection, and intelligence level. However, the increasing connectivity of medical devices has also made IoMT networks vulnerable to various cyberattacks, particularly Distributed Denial of Service (DDoS) attacks. Existing intrusion detection systems (IDS) are not adequately equipped to handle and mitigate these sophisticated cyberattacks. Moreover, given the dynamic nature of IoMT traffic, where the Routing Protocol for Low-Power and Lossy Networks (RPL) is often deployed to adapt changes in network topology, the intrusion detection system faces significant challenges in maintaining up-to-date threat detection capabilities. This paper proposes a hybrid Deep Learning-Based Intrusion Detection System for the RPL protocol in IoMT networks. The suggested model, designated HIDS-RPL, results from the hybridization of the Convolutional Neural Network (CNN) for feature extraction and the Long Short Term Memory neural network (LSTM), typically employed for sequence data prediction. We evaluate the proposed algorithm to detect intrusions using the benchmark CIC-DDoS2019 dataset. This dataset contains a large and diverse collection of traffic flows from real-world DDoS attacks, including SYN floods, UDP floods, HTTP floods, etc. We evaluated our novel methodology against five DDoS attacks: DNS, UDP, UDP-Lag, NTP, and SYN. In comparison to the most recent methods, our suggested model achieves an accuracy of 99.87%, a precision of 98.5%, a recall rate of 98.64%, and an F1-score of 98.54%.
引用
收藏
页码:38404 / 38429
页数:26
相关论文
共 75 条
[1]   Cost-effective detection system of cross-site scripting attacks using hybrid learning approach [J].
Abu Al-Haija, Qasem .
RESULTS IN ENGINEERING, 2023, 19
[2]   A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach [J].
Abu Al-Haija, Qasem ;
Alohaly, Manar ;
Odeh, Ammar .
SENSORS, 2023, 23 (07)
[3]  
Afanasyev A., 2013, P IFIP NETW C MAY, P1
[4]  
Agarwal Ankit, 2022, 2022 1st International Conference on Informatics (ICI)., P36, DOI 10.1109/ICI53355.2022.9786899
[5]  
Ajani AA, 2017, 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), P280, DOI 10.1109/NIGERCON.2017.8281901
[6]   A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Bahashwan, Abdullah Ahmed ;
Hasbullah, Iznan Husainy ;
Aladaileh, Mohammad Adnan ;
AL Mukhaini, Ghada .
INTERNET OF THINGS, 2023, 22
[7]  
Al-Haija Q A., 2021, 12 INT NETW C INC 20, P100, DOI [10.1007/978-3-030-64758-2_8, DOI 10.1007/978-3-030-64758-2_8]
[8]   Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks [J].
Al-Sarawi, Shadi ;
Anbar, Mohammed ;
Alabsi, Basim Ahmad ;
Aladaileh, Mohammad Adnan ;
Rihan, Shaza Dawood Ahmed .
IEEE ACCESS, 2023, 11 :94081-94093
[9]   An Efficient NIDPS with Improved Salp Swarm Feature Optimization Method [J].
Alabrah, Amerah .
APPLIED SCIENCES-BASEL, 2023, 13 (12)
[10]   Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks [J].
Albishari, Mohammed ;
Li, Mingchu ;
Zhang, Runfa ;
Almosharea, Esmail .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (03) :2626-2653