| Literature DB >> 34063577 |
Carlos D Morales-Molina1, Aldo Hernandez-Suarez1, Gabriel Sanchez-Perez1, Linda K Toscano-Medina1, Hector Perez-Meana1, Jesus Olivares-Mercado1, Jose Portillo-Portillo1, Victor Sanchez2, Luis Javier Garcia-Villalba3.
Abstract
At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack-the Clone ID attack-directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.Entities:
Keywords: Clone ID attack; IDS; Internet of Things; IoT; RPL; deep learning; intrusion detection; machine learning
Year: 2021 PMID: 34063577 PMCID: PMC8124991 DOI: 10.3390/s21093173
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The AST–WSN topology comprises cluster head nodes that forward data to the router nodes, which finally sends the sensed information to an AST Server for storage and analysis.
Figure 2Number of cyber-attack types directed at IoT protocols, emphasizing those aimed at RPL and LLNs.
Figure 3Concept diagram of DODAG node organization.
Codes for RPL control message types.
| Code Field ID | Description |
|---|---|
| 0x00 | DODAG Information Solicitation (DIS) |
Figure 4(a) Clone ID attack launching and (b) outcome.
Common logging information gathering and detection capabilities of perimeter security solutions. Those who interact with IoT protocols are highlighted in bold.
| Logging Information Gathering Capabilities | Detection Capabilities |
|---|---|
| -Timestamp (e.g., date and time) | -Application layer reconnaissance and attacks |
| -Connection or session ID | - |
| -Event or alert type | |
| -Rating (e.g., priority, severity, impact, confidence) | |
| - | |
| -Source and destination IP addresses | -Unexpected application services |
| -Source and destination TCP or UDP ports, or ICMP types and codes | |
| -Number of bytes transmitted over the connection | |
| -Decoded payload data, such as application requests and responses | |
| -State-related information (e.g., authenticated username) |
† IoT network protocols; ‡ already recognized RPL-oriented attacks.
Centralized and distributed techniques for corrective controls in the detection of Clone ID Attacks.
| Category | Description | Taxonomies | Memory Complexities Reported * |
|---|---|---|---|
| Centralized | Uses a powerful central Base Station (BS) to track each node position and its neighbours identity when joining to the network | Key usage-based |
|
| Distributed | Clone replication is applied to all network nodes with no central Base Station (BS) | Node to network broadcasting |
|
* results expressed in BIG-O notation.
Related work using ML models on RPL and DODAG attacks.
| Authors | ML Algorithm | Attack | Data Set |
|---|---|---|---|
| Yavuz, F. Y. et al. [ | Deep Feed-Forward Network (DFFN) | Decreased rank | Custom WSN data |
| Hello flood | |||
| Version number | |||
| Hodo et al. [ | MLP | UDP DDoS/DOS | NSL-KDD |
| Al-Qatf et al. [ | SAE and SVM | DoS, Probe, R2L, U2R | Custom TCP/UDP traffic |
Figure 5Workflow of the proposed methodology.
Data set sizes and corresponding topologies.
| Data Set Name | No. of Nodes | Malicious Nodes | Benign Nodes | Samples |
|---|---|---|---|---|
|
| 20 | 2 | 18 | 1,232,862 |
|
| 50 | 5 | 45 | 1,576,668 |
|
| 100 | 10 | 90 | 1,492,579 |
Figure 6IoT virtual environment to simulate the Clone ID attack.
Figure 7Sensors employed to simulate a Clone ID attack, with different topologies and node configurations.
Feature descriptions for the data set.
| No. | Field Name | Description | Type of Feature |
|---|---|---|---|
| 1 | frame.cap_len | Frame length stored into the capture file | Numerical |
| 2 | frame.len | Frame length on the wire | Numerical |
| 3 | frame.number | Frame Number | Numerical |
| 4 | frame.time_delta | Time delta from previous captured frame | Numerical |
| 5 | frame.time_epoch | Epoch Time | Numerical |
| 6 | frame.time_relative | Time since reference or first frame | Numerical |
| 7 | wpan.ack_request | Acknowledge Request | Categorical |
| 8 | wpan.dst_addr_mode | Destination Addressing Mode | Categorical |
| 9 | wpan.fcf | Frame Control Field | Numerical |
| 10 | wpan.fcs | Frame Check Sequence | Numerical |
| 11 | wpan.frame_length | Frame Length | Numerical |
| 12 | wpan.pending | Frame Pending | Categorical |
| 13 | wpan.seq_no | Sequence Number | Numerical |
| 14 | 6lowpan.pattern | Pattern | Categorical |
| 15 | ipv6.dst | Destination | Categorical |
| 16 | ipv6.plen | Payload Length | Numerical |
| 17 | ipv6.src | Source | Categorical |
| 18 | icmpv6.checksum | Checksum | Numerical |
| 19 | icmpv6.code | Code | Categorical |
| 20 | class | Normal or attack class | Numerical |
Data set descriptions after the pre-processing steps.
| Data Set Name | No. of Features | Samples |
|---|---|---|
|
| 67 | 1,749,976 |
|
| 121 | 2,131,328 |
|
| 211 | 2,078,832 |
Figure 8Conceptual diagram of an Autoencoder.
Figure 9Autoencoder and SAE configurations.
Comparison of different shallow algorithms and detected flaws.
| Algorithm | Drawbacks for Detecting IoT Attacks and Threats |
|---|---|
| DT [ | Large data storage, computational complexity with high-dimensional network features, prone to over-fitting |
| SVM [ | Overlapping of class samples with large data sets, such as IoT network samples |
| NB [ | Inaccurate for finding feature relationships in complex data representations, comparable to impersonation and sybil attacks |
| KNN [ | Flawed and time-consuming processes for finding optimal neighbours over raw data corresponding to IoT packets |
| AR [ | Ineffective to map efficient rules in large IoT network nodes |
Figure 10Architecture of the DNN.
Figure 11DNN configuration and hyper-parameters.
Ensemble of Autoencoders and DNN architectures.
| No. of Model | Configuration |
|---|---|
| 1 | No Autoencoder + DNN |
| 2 | SAE + DNN |
| 3 | AE + DNN |
Performance metrics for the data set.
| No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
|---|---|---|---|---|---|
|
|
|
|
|
|
|
| 2 | AE + DNN | 94.41 | 94.43 | 3:13:54 |
|
| 3 | No Autoencoder + DNN | 93.46 | 93.36 | 4:20:30 |
|
* Based on the proposition described in [67], where it was explained that the hidden units of deep networks can grow exponentially, where h is the number of hidden units and Ω specifies that the algorithm will at least take a certain amount of time to produce and operate, without exceeding a certain period of time.
Performance metrics for the node data set.
| No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
|---|---|---|---|---|---|
|
|
|
|
|
|
|
| 2 | AE + DNN | 99.08 | 99.08 | 4:05:47 |
|
| 3 | No Autoencoder + DNN | 99.04 | 99.04 | 3:16:44 |
|
* Based on the proposition described in [67], where it was explained that the hidden units of deep networks can grow exponentially, where h is the number of hidden units and Ω specifies that the algorithm will at least take a certain amount of time to produce and operate, without exceeding a certain period of time.
Performance metrics for the node data set.
| No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
|---|---|---|---|---|---|
|
|
|
|
|
|
|
| 2 | AE + DNN | 98.66 | 98.66 | 2:19:50 |
|
| 3 | No Autoencoder + DNN | 98.53 | 98.53 | 1:41:24 |
|
* Based on the proposition described in [67], where it was explained that the hidden units of deep networks can grow exponentially, where h is the number of hidden units and Ω specifies that the algorithm will at least take a certain amount of time to produce and operate, without exceeding a certain period of time.
Comparison with well-known works that presented ML approaches to classify security threats in IoT environments.
| Author | Algorithm | Accuracy |
|---|---|---|
| Yavuz, F. Y. [ | Deep Feed Forward Network (DFFN) | 94.9% |
| Hodo et al. [ | Multi-level perceptron (MLP) | 99.4% |
| Rezvy et al. [ | Autoencoder A-DNN (DNN) | 99.3% |
| Al-Qatf et al. [ | SAE+SVM | 99.4% |
| This proposal ( | SAE + DNN | 96.72% |
|
|
|
|
| This proposal ( | SAE + DNN | 99.25% |
Figure 12Proposed module integration for an IDS/IPS using the proposed framework.