Defense Scheme to Protect IoT from Cyber Attacks using AI Principles

Tariq Ahamad Ahanger

Abstract


Even in its infancy, the internet of things (IoT) has enticed most of the modern industrial areas like smart cities, automobiles, medical technology. Since IoT connects everything together, it is vulnerable to a variety of devastating intrusion attacks. Being the internet of different devices makes it easy for attackers to launch their attacks. Thus, to combat all these attacks, an attack analysis is presented in this article using the basic principles of Artificial Neural Networks. Internet packet traces are used to train to the supervised ANN (Multilevel Perceptron) and evaluated after the training to decline the DDoS Attacks. This research article mainly focuses on the categorization of traffic patterns into legitimate traffic and attack traffic patterns in IoT network. The ANN processes are evaluated and tested in a simulated IoT network. The experimental results show a greater accuracy in detection of various DDoS attacks.

Keywords


ANN, IoT, DDoS, Security, IDS, AI.

Full Text:

PDF

References


Ahamad, T. (2016). Detection and Defense Against Packet Drop Attack in MANET, International Journal of Advanced Computer Science and Applications (IJACSA), 7(2), 2016.
https://doi.org/10.14569/IJACSA.2016.070246

Ahamad, T.; Aljumah, A. (2015). Detection and defense mechanism against DDoS in MANET, Indian Journal of Science and Technology, 8(33), 2015.
https://doi.org/10.17485/ijst/2015/v8i33/80152

Alan, S.; Overill, R.E.; Radzik, T. (2016). Detection of known and unknown DDoS attacks using Artificial Neural Networks, Neurocomputing, 172, 385–393, 2016.
https://doi.org/10.1016/j.neucom.2015.04.101

Aldaej, A.; Ahamad, T. (2016). AAODV (Aggrandized Ad Hoc on Demand Vector): A Detection and Prevention Technique for Manets, International Journal of Advanced Computer Science and Applications(IJACSA), 7(10), 2016.
https://doi.org/10.14569/IJACSA.2016.071018

Aljumah, A.; Ahamad, T. (2016). Black Hole and Mobile Ad Hoc Network (MANET): A Simple Logical Solution, In: 11th International Conference on Cyber Warfare and Security: ICCWS2016, 1-9, 2016.

Aljumah, A.; Ahamad, T. (2016). A Novel Approach for Detecting DDoS using Artificial Neural Networks, International Journal of Computer Science and Network Security, 16(12), 132-138, 2016.

Ahmed, E.; Yaqoob, I.; Gani, A.; Imran, M.; Guizani, M. (2016). Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges, IEEE Wireless Communications, 23(5), 10–16, 2016.
https://doi.org/10.1109/MWC.2016.7721736

Alrajeh, N. A.; Khan, S.; Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review, International Journal of Distributed Sensor Networks, 1-7, 2013.
https://doi.org/10.1155/2013/167575

Alshehri, A.; Sandhu, R. (2016). Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In: Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on, 530–538, 2016.
https://doi.org/10.1109/CIC.2016.081

Bucerzan, D.; Cayrel, P.-L.; Dragoi, V.; Richmond, T. (2017). Improved Timing Attacks against the Secret Permutation in the McEliece PKC, International Journal of Computers Communications & Control, 12(1), 7-25, 2017.
https://doi.org/10.15837/ijccc.2017.1.2780

Butun, I.; Morgera, S. D.; Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks, IEEE Communications Surveys & Tutorials, 16(1), 266–282, 2014.
https://doi.org/10.1109/SURV.2013.050113.00191

Creech, G.; Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns, IEEE Transactions on Computers, 63(4), 807–819, 2014.
https://doi.org/10.1109/TC.2013.13

Elhag, S.; Ferná ndez, A.; Bawakid, A.; Alshomrani, S.; Herrera, F. (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems, Expert Systems with Applications, 42(1), 193–202, 2015.
https://doi.org/10.1016/j.eswa.2014.08.002

Elkhodr, M.; Shahrestani, S.; Cheung, H. (2016). The internet of things: new interoperability, management and security challenges. arXiv preprint arXiv:1604.04824.

Han, G.; Shu, L.; Chan, S.; Hu, J. (2016). Security and privacy in Internet of things: methods, architectures, and solutions. Security and Communication Networks, 9(15), 2641– 2642, 2016.
https://doi.org/10.1002/sec.1497

Gong, W. (2016). The Internet of Things (IoT): what is the potential of the internet of things (IoT) as a marketing tool?, Bachelor's Thesis, University of Twente, 2016.

Gunasekaran, A.; Subramanian, N.; Tiwari, M.K. (2016). Information technology governance in Internet of Things supply chain networks, Industrial Management & Data Systems, 116.7, 2016.

Kim, G.; Lee, S.; Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690– 1700, 2014.
https://doi.org/10.1016/j.eswa.2013.08.066

Madakam, S.; Date, H. (2016). Security Mechanisms for Connectivity of Smart Devices in the Internet of Things, In Connectivity Frameworks for Smart Devices (pp. 23–41). Springer International Publishing.
https://doi.org/10.1007/978-3-319-33124-9_2

McKelvey, B.; Tanriverdi, H.; Yoo, Y. (2016). Complexity and Information Systems Research in the Emerging Digital World. MIS Quarterly.

Mitchell, R.; Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 55, 2014.
https://doi.org/10.1145/2542049

Moshtaghi, M.; Erfani, S. M.; Leckie, C.; Bezdek, J. C. (2017). Exponentially Weighted Ellipsoidal Model for Anomaly Detection. International Journal of Intelligent Systems, 32(9), 881-899, 2017.
https://doi.org/10.1002/int.21875

Niu, J.; Jin, Y.; Lee, A.J.; Sandhu, R.; Xu, W.; Zhang, X. (2016). Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. In Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 49–50, 2016.
https://doi.org/10.1145/2914642.2927920

Samaila, M. G.; Neto, M.; Fernandes, D. A.; Freire, M. M.; Iná cio, P. R. (2017). Security Challenges of the Internet of Things, Beyond the Internet of Things, 53–82, 2017.

Singh, M.; Rajan, M. A.; Shivraj, V. L.; Balamuralidhar, P. (2015). Secure mqtt for internet of things (iot). In: Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, IEEE, 746–751, 2015.

Tariq, U.; Aldaej A. (2018). Outlook of Coordinated Transmission Control in 5G Networks for IoTs, International Journal of Computers Communications & Control, 13(2), 280-293, 2018.
https://doi.org/10.15837/ijccc.2018.2.3125

Tellez, M.; El-Tawab, S.; Heydari, H. M. (2016). Improving the security of wireless sensor networks in an IoT environmental monitoring system. In Systems and Information Engineering Design Symposium (SIEDS), 2016 IEEE, 72–77, 2016.
https://doi.org/10.1109/SIEDS.2016.7489330

Xu, K.; Qu, Y.; Yang, K. (2016). A tutorial on the internet of things: from a heterogeneous network integration perspective, IEEE Network, 30(2), 102–108, 2016.
https://doi.org/10.1109/MNET.2016.7437031

Zheng, Z.; Xie, S.; Dai, H. N.; Wang, H. (2016). Blockchain Challenges and Opportunities: A Survey, Int. J. Web and Grid Services, 14(4), 2018.

Zhao, S.; Cheng, B.; Yu, L.; Hou, S. L.; Zhang, Y.; Chen, J. L. (2016). Internet of Things Service Provisioning Platform for Cross-Application Cooperation, International Journal of Web Services Research (IJWSR), 13(1), 1–22, 2016.
https://doi.org/10.4018/IJWSR.2016010101




DOI: https://doi.org/10.15837/ijccc.2018.6.3356



Copyright (c) 2018 Tariq Ahamad Ahanger

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.

 

 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2); Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.