A novel intrusion detection system for internet of things devices and data

被引:9
作者
Kaushik, Ajay [1 ]
Al-Raweshidy, Hamed [1 ]
机构
[1] Brunel Univ London, Dept Elect & Elect Engn, London, England
关键词
Data security; Internet of Things; Intrusion detection; Machine learning; Teaching-learning-based optimization;
D O I
10.1007/s11276-023-03435-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we enter the new age of the Internet of Things (IoT) and wearable gadgets, sensors, and embedded devices are extensively used for data aggregation and its transmission. The extent of the data processed by IoT networks makes it vulnerable to outside attacks. Therefore, it is important to design an intrusion detection system (IDS) that ensures the security, integrity, and confidentiality of IoT networks and their data. State-of-the-art IDSs have poor detection capabilities and incur high communication and device overhead, which is not ideal for IoT applications requiring secured and real-time processing. This research presents a teaching-learning-based optimization enabled intrusion detection system (TLBO-IDS) which effectively protects IoT networks from intrusion attacks and also ensures low overhead at the same time. The proposed TLBO-IDS can detect analysis attacks, fuzzing attacks, shellcode attacks, worms, denial of service (Dos) attacks, exploits, and backdoor intrusion attacks. TLBO-IDS is extensively tested and its performance is compared with state-of-the-art algorithms. In particular, TLBO-IDS outperforms the bat algorithm and genetic algorithm (GA) by 22.2% and 40% respectively.
引用
收藏
页码:285 / 294
页数:10
相关论文
共 44 条
  • [1] Abdeldayem MM, 2023, ARAB J SCI ENG, V48, P9849, DOI [10.1007/s13369-022-07421-0, 10.1145/3544999.3552538]
  • [2] Ahmad F. B., 2022, SECURING CLOUD DATA, DOI [10.21203/rs.3.rs-1315357/v1, DOI 10.21203/RS.3.RS-1315357/V1]
  • [3] A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm
    Al Janabi, Shakir Mahmood
    Kurnaz, Sefer
    [J]. WIRELESS NETWORKS, 2024, 30 (06) : 5465 - 5485
  • [4] Detection of IoT-botnet attacks using fuzzy rule interpolation
    Al-Kasassbeh, Mouhammd
    Almseidin, Mohammad
    Alrfou, Khaled
    Kovacs, Szilveszter
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (01) : 421 - 431
  • [5] Alotaibi B., 2016, 2016 IEEE LONG ISLAN
  • [6] Anati Ittai, 2013, P 2 INT WORKSH HARDW, V13
  • [7] [Anonymous], 2009, FREERTOS REFERENCE M
  • [8] [Anonymous], 1982, QNX OPERATING SYSTEM
  • [9] Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
    Attou, Hanaa
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Farhaoui, Yousef
    [J]. BIG DATA MINING AND ANALYTICS, 2023, 6 (03) : 311 - 320
  • [10] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805