An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

被引:309
作者
Moustafa, Nour [1 ]
Turnbull, Benjamin [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] Univ New South Wales, Australian Ctr Cyber Secur, Canberra Campus, Canberra, ACT 2600, Australia
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
关键词
Botnet; ensemble learning; Internet of Things (IoT); network intrusion detection system (NIDS); statistical flow features; CLASSIFICATION;
D O I
10.1109/JIOT.2018.2871719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) plays an increasingly significant role in our daily activities, connecting physical objects around us into digital services. In other words, IoT is the driving force behind home automation, smart cities, modern health systems, and advanced manufacturing. This also increases the likelihood of cyber threats against loT devices and services. Attackers may attempt to exploit vulnerabilities in application protocols, including Domain Name System (DNS), Hyper Text Transfer Protocol (HTTP) and Message Queue Telemetry Transport (MQTT) that interact directly with backend database systems and client-server applications to store data of IoT services. Successful exploitation of one or more of these protocols can result in data leakage and security breaches. In this paper, an ensemble intrusion detection technique is proposed to mitigate malicious events, in particular botnet attacks against DNS, HTTP, and MQTT protocols utilized in IoT networks. New statistical flow features are generated from the protocols based on an analysis of their potential properties. Then, an AdaBoost ensemble learning method is developed using three machine learning techniques, namely decision tree, Naive Bayes (NB), and artificial neural network, to evaluate the effect of these features and detect malicious events effectively. The UNSW-NB15 and NIMS botnet datasets with simulated IoT sensors' data are used to extract the proposed features and evaluate the ensemble technique. The experimental results show that the proposed features have the potential characteristics of normal and malicious activity using the correntropy and correlation coefficient measures. Moreover, the proposed ensemble technique provides a higher detection rate and a lower false positive rate compared with each classification technique included in the framework and three other state-of-the-art techniques.
引用
收藏
页码:4815 / 4830
页数:16
相关论文
共 29 条
[1]   The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks [J].
Abaid, Zainab ;
Sarkar, Dilip ;
Kaafar, Mohamed Ali ;
Jha, Sanjay .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :61-68
[2]   DNS amplification attack revisited [J].
Anagnostopoulos, Marios ;
Kambourakis, Georgios ;
Kopanos, Panagiotis ;
Louloudakis, Georgios ;
Gritzalis, Stefanos .
COMPUTERS & SECURITY, 2013, 39 :475-485
[3]  
[Anonymous], 2018, AWS IOT HUB
[4]  
[Anonymous], 2018, THE NIMS DATASET
[5]  
[Anonymous], 2018, THE BRO IDS TOOL
[6]  
[Anonymous], THE UNSW NB15 DATASE
[7]  
[Anonymous], 2018, THE PROFILER PACKAGE
[8]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[9]  
Bouzida Y., 2006, IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), V28, P29
[10]   Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks [J].
Cao, Xianghui ;
Shila, Devu Manikantan ;
Cheng, Yu ;
Yang, Zequ ;
Zhou, Yang ;
Chen, Jiming .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :816-829