Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.12.24

Intelligent & Predictive Security Deployment in IOT Environments  

Abdul ghani, ansari (QUEST)
Irfana, Memon (QUEST)
Fayyaz, Ahmed (QUEST)
Majid Hussain, Memon (QUEST)
Kelash, Kanwar (QUEST)
fareed, Jokhio (QUEST)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.12, 2022 , pp. 185-196 More about this Journal
Abstract
The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.
Keywords
Distributed Denial of Service (DDoS) Attacks; Knowledge-Discovery-Dataset(KDD); Artificial Neural Network (ANN); Traincgb; Trainoss; Trainrp; Traingdb;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169-175.   DOI
2 Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1-6). IEEE.
3 Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence, 2(1), 41-50.   DOI
4 Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y. M., AugustoGonzalez, J., & Ramos, M. (2018, February). Deep learning with dense random neural networks for detecting attacks against iot-connected home environments. In International ISCIS Security Workshop (pp. 79-89). Springer, Cham.
5 Ahanger, T. A. (2017, March). An effective approach of detecting DDoS using Artificial Neural Networks. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 707-711). IEEE.
6 Aljumah, A., & Ahamad, T. (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12), 132-138.
7 "Powell, M.J.D., 'Restart procedures for the conjugate gradient method,' Mathematical Programming, Vol. 12, 1977, pp. 241-254."   DOI
8 "Beale, E.M.L., 'A derivation of conjugate gradients,' in F.A. Lootsma, Ed., Numerical methods for nonlinear optimization, London: Academic Press, 1972."
9 "Battiti, R., 'First and second order methods for learning: Between steepest descent and Newton's method,' Neural Computation, Vol. 4, No. 2, 1992, pp. 141-166."   DOI
10 "Riedmiller, M., and H. Braun, 'A direct adaptive method for faster backpropagation learning: The RPROP algorithm,' Proceedings of the IEEE International Conference on Neural Networks, 1993."
11 Bharadwaj, H., & Kumar, V. (2018). Comparative study of neural networks in path planning for catering robots. Procedia computer science, 133, 417-423.   DOI
12 S. A. R. Shah and B. Issac, "Performance comparison of intrusion detection systems and application of machine learning to Snort system," Futur. Gener. Comput. Syst., vol. 80, no. November 2017, pp. 157-170, 2018.   DOI
13 Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, "Blockchain for the IoT and industrial IoT: A review," Internet of Things, p. 100081, 2019.
14 "The 7 Most Common IoT Security Threats in 2019 | IoT For All," 2019. [Online]. Available: https://www.iotforall.com/7-most-common-iotsecuritythreats-2019/. [Accessed: 13-Jul-2019].
15 A. R. Baker and J. Esler, Snort IDS, IPS Toolkit. Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Dr. Burlington, MA 01803, 2007.
16 R. Vishwakarma and A. K. Jain, "A survey of DDoS attacking techniques and defence mechanisms in the IoT network," Telecommunication Systems, vol. 73, no. 1, pp. 3-25,   DOI
17 M. M. Salim, S. Rathore, and J. H. Park, "Distributed denial of service attacks and its defenses in IoT: a survey," The Journal of Supercomputing, pp. 1-44, 2019.
18 G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing: Issues, taxonomy, and future directions," Computer Communications, vol. 107, pp. 30-48, 2017.   DOI
19 Mendez,D.M.,Papapanagiotou,I.,&Yang,B.(2017).Internetof things: Survey on security and privacy. arXiv preprint arXiv:1707. 01879.
20 McDermott, C. D., Petrovski, A. V., & Majdani, F. (2018, June). Towards situational awareness of botnet activity in the internet of things. In 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA) (pp. 1-8). IEEE.
21 Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 2, 76-79.   DOI
22 A. Whitmore, A. Agarwal, and L. Da Xu, "The Internet of Things-A survey of topics and trends," Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, 2015.   DOI
23 Jerkins, J. A. (2017, January). Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1-5). IEEE.
24 O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016.   DOI
25 A. Rawashdeh, M. Alkasassbeh, and M. Al-Hawawreh, "An anomaly-based approach for DDoS attack detection in cloud environment," International Journal of Computer Applications in Technology, vol. 57, no. 4, pp. 312-324, 2018.   DOI
26 H. Polat, O. Polat, and A. Cetin, "Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models," Sustainability, vol. 12, no. 3, p. 1035, 2020.   DOI
27 M. Idhammad, K. Afdel, and M. Belouch, "Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest," Security and Communication Networks, vol. 2018, 2018.
28 A. Saied, R. E. Overill, and T. Radzik, "Detection of known and unknown DDoS attacks using Artificial Neural Networks," Neurocomputing, vol. 172, pp. 385-393, 2016.   DOI
29 M. Ghanbari and W. Kinsner, "Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), vol. 14, no. 1, pp. 17-34, 2020.
30 A. Amjad, T. Alyas, U. Farooq, and M. Tariq, "Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm," EAI Endorsed Transactions on Scalable Information Systems, vol. 6, no. 23, 2019.
31 Michael Negnevitsky. Artificial Intelligence: A Guide to Intelligent Systems. Pearson, 2011.
32 I. Kotenko, I. Saenko, F. Skorik, and S. Bushuev. Neural network approach to forecast the state of the internet of things elements. In Soft Computing and Measurements (SCM), 2015 XVIII International Conference on, pages 133-135, May 2015.
33 Dongare, A. D., Kharde, R. R., & Kachare, A. D. (2012). Introduction to artificial neural network. International Journal of Engineering and Innovative Technology (IJEIT), 2(1), 189-194.
34 O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. E. Mohamed, and H. Arshad, "State-of-the-art in artificial neural network applications: A survey," Heliyon, vol. 4, no. 11. Elsevier Ltd, p. e00938, 2018.   DOI
35 M. S. Galina Mikhaylova, "The 'Anonymous' Movement: Hacktivism as an Emerging Form of Political Participation," Graduate Council of Texas State University, 2014
36 S. Paliwal and R. Gupta, "Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm," Int. J. Comput. Appl., vol. 60, no. 19, pp. 975-8887, 2012.
37 M. Sabhnani and G. Serpen, "KDD feature set complaint heuristic rules for R2L attack detection," Proc. Int. Conf. Secur. Manag., vol. 1, pp. 310-316, 2003.
38 Jia, Y., Zhong, F., Alrawais, A., Gong, B., & Cheng, X. (2020). Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet of Things Journal, 7(10), 9552-9562.   DOI
39 F. Mozneb and A. Farzan, "The Use of Intelligent Algorithms to Detect Attacks In," vol. 3, no. 9, pp. 579- 584, 2014.   DOI
40 Pande, S., Khamparia, A., Gupta, D., & Thanh, D. N. (2021). DDOS Detection Using Machine Learning Technique. In Recent Studies on Computational Intelligence (pp. 59-68). Springer, Singapore.
41 Gajewski, M., Mongay Batalla, J., Mastorakis, G., & avromoustakis, C. X. (2020). Anomaly traffic detection and correlation in Smart Home automation IoT systems. Transactions on Emerging Telecommunications Technologies, e4053.
42 Dong, X., Dong, C., Chen, Z., Cheng, Y., & Chen, B. (2020). BotDetector: An extreme learning machine-based Internet of Things botnet detection model. Transactions on Emerging Telecommunications Technologies, e3999.
43 de Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., & dos Santos Vieira, G. (2020). Hybrid approach to intrusion detection in fog-based IoT environments. Computer Networks, 180, 107417.   DOI
44 Syed, N. F., Baig, Z., Ibrahim, A., & Valli, C. (2020). Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, 4(4), 482-503.   DOI
45 Cvitic, I., Perakovic, D., Perisa, M., & Botica, M. (2019). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks, 1-14.
46 Alsamiri, J., & Alsubhi, K. (2019). Internet of Things cyber attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl, 10(12).
47 Aamir, M., & Zaidi, S. M. A. (2019). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences.
48 Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE.
49 Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., & Robles-Kelly, A. (2019, December). Deep learning-based intrusion detection for iot networks. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC) (pp. 256-25609). IEEE.
50 NG, B. A., & Selvakumar, S. (2019). Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing, 340, 294-308.   DOI
51 Mallikarjunan, K. N., Bhuvaneshwaran, A., Sundarakantham, K., & Shalinie, S. M. (2019). DDAM: Detecting DDoS attacks using machine learning approach. In Computational Intelligence: Theories, Applications and Future Directions-Volume I (pp. 261-273). Springer, Singapore.
52 Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE.
53 Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops(SPW) (pp. 29-35). IEEE.
54 Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.   DOI