An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression

被引:30
作者
Ioannou, Christiana [1 ]
Vassiliou, Vasos [1 ,2 ]
机构
[1] Univ Cyprus, Dept Comp Sci, Nicosia, Cyprus
[2] RISE Res Ctr Interact Media, Smart Syst & Emerging Technol, Nicosia, Cyprus
来源
MSWIM'18: PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS | 2018年
关键词
Wireless Sensor Networks; Internet of Things; Intrusion Detection Systems; Binary Logistic Regression;
D O I
10.1145/3242102.3242145
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we evaluate the feasibility of running a lightweight Intrusion Detection System within a constrained sensor or IoT node. We propose mIDS, which monitors and detects attacks using a statistical analysis tool based on Binary Logistic Regression (BLR). mIDS takes as input only local node parameters for both benign and malicious behavior and derives a normal behavior model that detects abnormalities within the constrained node. We offer a proof of correct operation by testing mIDS in a setting where network-layer attacks are present. In such a system, critical data from the routing layer is obtained and used as a basis for profiling sensor behavior. Our results show that, despite the lightweight implementation, the proposed solution achieves attack detection accuracy levels within the range of 96% - 100%.
引用
收藏
页码:259 / 263
页数:5
相关论文
共 12 条
[1]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[2]  
Busching Felix, 2011, P 9 ACM C EMB NETW S P 9 ACM C EMB NETW S, P2
[3]  
Eriksson J., 2011, Rep. T2011:05
[4]  
Ioannou C., 2016, P 13 ACM S PERF EV W P 13 ACM S PERF EV W
[5]  
Ioannou C, 2017, PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017)
[6]  
Ioannou C, 2016, 2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), P20, DOI [10.1109/SIoT.2016.11, 10.1109/SIoT.2016.009]
[7]  
MAXFOR Technology Inc, 2011, SENS NETW MAK SENS W SENS NETW MAK SENS W
[8]  
Moteiv Corporation, 2006, TMOTE SKY ULTR LOW P TMOTE SKY ULTR LOW P
[9]  
Osterlind Fredrik, 2011, IMPROVING LOW POWER
[10]   SVELTE: Real-time intrusion detection in the Internet of Things [J].
Raza, Shahid ;
Wallgren, Linus ;
Voigt, Thiemo .
AD HOC NETWORKS, 2013, 11 (08) :2661-2674