Routing Attacks Detection in 6LoWPAN-Based Internet of Things

被引:13
作者
Alazab, Ammar [1 ]
Khraisat, Ansam [2 ]
Singh, Sarabjot [1 ]
Bevinakoppa, Savitri [1 ]
Mahdi, Osama A. [1 ]
机构
[1] Melbourne Inst Technol, Sch Informat Technol & Engn, Melbourne, Vic 3000, Australia
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
关键词
anomaly detection; network attack; routing attack; IoT attacks; machine learning; intrusion detection system; INTRUSION DETECTION;
D O I
10.3390/electronics12061320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to the limited resources of the devices and its dynamic network topology. Routing attacks on 6LoWPAN-based IoT devices can be particularly challenging to detect because of its unique characteristics of the network. In recent years, several techniques have been proposed for detecting routing attacks, including anomaly detection. These techniques leverage different features of network traffic to identify and classify routing attacks. This paper focuses on routing attacks that target the Routing Protocol for Low-Power and Lossy Networks (RPL), which are widely used in 6LoWPAN-based IoT systems. The attacks discussed in this paper can be categorized as either inherited from Wireless Sensor Networks or exploiting vulnerabilities unique to RPL (known as RPL-specific attacks). The paper describes various RPL attacks, including Flood Attacks, Data-DoS/DDoS Attacks, Wormhole Attacks, RPL Rank Attacks, Blackhole Attacks, Version Attacks, and Sinkhole Attacks. In this paper, a novel Hybrid Intrusion Detection System (HIDS) that combines a decision tree classifier and a one-class Support Vector Machine classifier is proposed to detect routing attacks. The HIDS draws on the strengths of both a Signature Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS) to identify routing attacks with a high degree of accuracy and a low false alarm rate. The routing dataset, which features genuine IoT network traffic and various kinds of routing attacks, was used to test the proposed HIDS. According to the findings, the hybrid IDS proposed in this study outperforms SIDS and AIDS approaches, with higher detection rates and lower false positive rates.
引用
收藏
页数:19
相关论文
共 29 条
[1]  
Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
[2]   Detection of Obfuscated Malicious Java']JavaScript Code [J].
Alazab, Ammar ;
Khraisat, Ansam ;
Alazab, Moutaz ;
Singh, Sarabjot .
FUTURE INTERNET, 2022, 14 (08)
[3]   A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues [J].
Alfandi, Omar ;
Khanji, Salam ;
Ahmad, Liza ;
Khattak, Asad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01) :37-55
[4]  
Almomani Omar, 2021, 2021 International Conference on Information Technology (ICIT), P440, DOI 10.1109/ICIT52682.2021.9491770
[5]   A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System [J].
Alzaqebah, Abdullah ;
Aljarah, Ibrahim ;
Al-Kadi, Omar ;
Damasevicius, Robertas .
MATHEMATICS, 2022, 10 (06)
[6]  
Anand A., 2012, International Journal of Advanced Research in Computer Science and Software Engineering, V2
[7]  
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1007/BF00058655
[8]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[9]  
Cho EJ, 2009, LECT NOTES COMPUT SC, V5787, P515
[10]  
SD, 2021, Journal of Trends in Computer Science and Smart Technology, V3, P59, DOI 10.36548/jtcsst.2021.1.006