| Literature DB >> 31035611 |
Geethapriya Thamilarasu1, Shiven Chawla2.
Abstract
Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.Entities:
Keywords: Internet of Things (IoT); Intrusion-Detection System (IDS); deep learning; machine learning; security
Year: 2019 PMID: 31035611 PMCID: PMC6539759 DOI: 10.3390/s19091977
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Intrusion Detection System Overview.
Figure 2IDS Detection Process.
Extracted Feature Set.
|
|
|
|
|
|
|
|
|
|
|
|
Figure 3Deep Belief Network Structure.
Figure 4Deep Neural Network Structure.
Figure 5Deep-Learning model for proposed IDS.
Figure 6Overview of proposed DNN Training.
Blackhole Attack Detection.
| Method | Precision | TPR | F1 Score |
|---|---|---|---|
| DL-Sim | 97.2% | 96.4% | 0.97 |
| IWC | 89% | 95% | 0.92 |
Opportunistic Attack Detection.
| Method | Precision | TPR | F1 Score |
|---|---|---|---|
| DL-Sim | 95.7% | 98% | 0.97 |
| IWC | 94% | 98% | 0.96 |
DDoS Attack Detection.
| Method | Precision | TPR | F1 Score |
|---|---|---|---|
| DL | 96% | 98.7% | 0.973 |
| IWC | 91% | 95% | 0.93 |
Sinkhole Attack Detection.
| Method | Precision | TPR | F1 Score |
|---|---|---|---|
| DL-Sim | 99.5% | 99% | 0.99 |
| DL-Testbed | 98.47% | 97% | 0.97 |
| IWC | 98.37% | 91.2% | 0.94 |
Wormhole Attack Detection.
| Method | Precision | TPR | F1 Score |
|---|---|---|---|
| DL-Sim | 96% | 98% | 0.97 |
| DL-Testbed | 93% | 91% | 0.92 |
| IWC | 98.37% | 97% | 0.97 |
Figure 7P-R Curves for Blackhole Attack.
Figure 8P-R Curves for DDoS Attack.
Figure 9P-R Curves for Opportunistic Service Attack.
Figure 10P-R Curves for Sinkhole Attack.
Figure 11P-R Curves for Wormhole Attack.