Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network

被引:45
作者
Ravi, Nagarathna [1 ]
Shalinie, S. Mercy [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai 625015, Tamil Nadu, India
关键词
Security; Internet of Things; Computer architecture; Cloud computing; Training; Machine learning; Switches; Data deluge (DD) attack; fog computing; Internet of Things (IoT); intrusion; security; semisupervised learning; ATTACK DETECTION; INTERNET; COMMUNICATION; ARCHITECTURES; THINGS;
D O I
10.1109/JIOT.2020.2993410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our world is moving toward an Internet of Things (IoT) era by connecting billions of IoT. There are several security loopholes in the IoT network. Intrusion can lead to performance degradation and pose a threat to data security. Hence, there is a need for a method to detect intrusion in the IoT networks. Existing solutions use supervised-learning-based intrusion detection methods that need a huge labeled data set for better accuracy. It is not easy to source out a huge labeled data set because the size of the IoT network is huge. To overcome some of the impediments in the existing solutions, we propose a novel SDRK machine learning (ML) algorithm to detect intrusion. SDRK leverages supervised deep neural networks (DNNs) and unsupervised clustering techniques. The intrusion detection and mitigation algorithms are placed in the fog nodes that are between IoT and cloud layers. We test our proposed methodology against the data deluge (DD) attack in the testbed. The SDRK model is tested on the benchmark NSL-KDD data set. We compare the results with state-of-the-art solutions. When testing with the NSL-KDD data set, we find that SDRK detects the attacks with improved accuracy of 99.78%.
引用
收藏
页码:11041 / 11052
页数:12
相关论文
共 27 条
[1]   Novel Anonymous Key Establishment Protocol for Isolated Smart Meters [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (04) :2844-2851
[2]  
[Anonymous], 2010, P 13 INT C ART INT S
[3]   An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
PATTERN RECOGNITION LETTERS, 2015, 51 :1-7
[4]  
Carlquist J., 2018, THESIS
[5]   A Mathematical Theory for Clustering in Metric Spaces [J].
Chang, Cheng-Shang ;
Liao, Wanjiun ;
Chen, Yu-Sheng ;
Liou, Li-Heng .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2016, 3 (01) :2-16
[6]   A review of information centric network-based internet of things: communication architectures, design issues, and research opportunities [J].
Din, Ikram Ud ;
Asmat, Hamid ;
Guizani, Mohsen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) :30241-30256
[7]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[8]   Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :169-175
[9]   Security and Privacy in Device-to-Device (D2D) Communication: A Review [J].
Haus, Michael ;
Waqas, Muhammad ;
Ding, Aaron Yi ;
Li, Yong ;
Tarkoma, Sasu ;
Ott, Jorg .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1054-1079
[10]   MULTILAYER FEEDFORWARD NETWORKS ARE UNIVERSAL APPROXIMATORS [J].
HORNIK, K ;
STINCHCOMBE, M ;
WHITE, H .
NEURAL NETWORKS, 1989, 2 (05) :359-366