IoT Routing Attacks Detection Using Machine Learning Algorithms

被引:18
作者
Rabhi, Sana [1 ]
Abbes, Tarek [2 ]
Zarai, Faouzi [1 ]
机构
[1] Natl Sch Elect & Telecommun, Sfax 3000, Tunisia
[2] Univ Sfax, InnovCom Lab, SUPCOM, Sfax, Tunisia
关键词
WSN; RPL; Attacks; Machine learning; Classification; INTRUSION DETECTION SYSTEM; INTERNET; PROTOCOL;
D O I
10.1007/s11277-022-10022-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) is a concept that aims to make the real world more intelligent but susceptible to various attacks. In this paper, we focus on wireless sensor networks (WSNs), as a founding block in the IoT presenting the vulnerability of routing attacks against Routing Protocol for Low power and Lossy Network (RPL). Besides, we discuss some existing research proposals to detect intrusions, and we develop a technique for detecting three types of attacks against RPL. We simulate using Contiki-Cooja four network scenarios one normal and three malicious presenting different attacks, to be able to generate the training and the test sets that are used in the machine learning phase, in which we used WEKA, to decide according to the database whether the behavior is normal or malicious. For this phase, we use different classification algorithms, which enable us to obtain a high precision value that is superior to 96% in all cases.
引用
收藏
页码:1839 / 1857
页数:19
相关论文
共 22 条
[1]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[2]   Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1294-1312
[3]  
Hall M., 2009, SIGKDD EXPLORATIONS, V11, DOI [10.1145/1656274.1656278, DOI 10.1145/1656274.1656278]
[4]  
Heberlein L. T., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P296, DOI 10.1109/RISP.1990.63859
[5]  
Ioulianou P., 2018, Information and Communication Technology Form
[6]   Toward a Lightweight Intrusion Detection System for the Internet of Things [J].
Jan, Sana Ullah ;
Ahmed, Saeed ;
Shakhov, Vladimir ;
Koo, Insoo .
IEEE ACCESS, 2019, 7 :42450-42471
[7]  
Kavitha P., 2014, INT J COMPUTER TREND, V12, P227, DOI [10.14445/22312803/IJCTT-V12P146, DOI 10.14445/22312803/IJCTT-V12P146]
[8]   A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks [J].
Kfoury, Elie ;
Saab, Julien ;
Younes, Paul ;
Achkar, Roger .
INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2019, 11 (01) :30-43
[9]   Learning pattern classification - A survey [J].
Kulkarni, SR ;
Lugosi, G ;
Venkatesh, SS .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (06) :2178-2206
[10]   UIDS: a unified intrusion detection system for IoT environment [J].
Kumar, Vikash ;
Das, Ayan Kumar ;
Sinha, Ditipriya .
EVOLUTIONARY INTELLIGENCE, 2021, 14 (01) :47-59