Defense Scheme to Protect IoT from Cyber Attacks using AI Principles


  • Tariq Ahamad Ahanger College of Computer Engineering & Sciecnes Prince Sattam Bin Abdulaziz University


ANN, IoT, DDoS, Security, IDS, AI.


Even in its infancy, the internet of things (IoT) has enticed most of the modern industrial areas like smart cities, automobiles, medical technology. Since IoT connects everything together, it is vulnerable to a variety of devastating intrusion attacks. Being the internet of different devices makes it easy for attackers to launch their attacks. Thus, to combat all these attacks, an attack analysis is presented in this article using the basic principles of Artificial Neural Networks. Internet packet traces are used to train to the supervised ANN (Multilevel Perceptron) and evaluated after the training to decline the DDoS Attacks. This research article mainly focuses on the categorization of traffic patterns into legitimate traffic and attack traffic patterns in IoT network. The ANN processes are evaluated and tested in a simulated IoT network. The experimental results show a greater accuracy in detection of various DDoS attacks.


Ahamad, T. (2016). Detection and Defense Against Packet Drop Attack in MANET, International Journal of Advanced Computer Science and Applications (IJACSA), 7(2), 2016.

Ahamad, T.; Aljumah, A. (2015). Detection and defense mechanism against DDoS in MANET, Indian Journal of Science and Technology, 8(33), 2015.

Alan, S.; Overill, R.E.; Radzik, T. (2016). Detection of known and unknown DDoS attacks using Artificial Neural Networks, Neurocomputing, 172, 385-393, 2016.

Aldaej, A.; Ahamad, T. (2016). AAODV (Aggrandized Ad Hoc on Demand Vector): A Detection and Prevention Technique for Manets, International Journal of Advanced Computer Science and Applications(IJACSA), 7(10), 2016.

Aljumah, A.; Ahamad, T. (2016). Black Hole and Mobile Ad Hoc Network (MANET): A Simple Logical Solution, In: 11th International Conference on Cyber Warfare and Security: ICCWS2016, 1-9, 2016.

Aljumah, A.; Ahamad, T. (2016). A Novel Approach for Detecting DDoS using Artificial Neural Networks, International Journal of Computer Science and Network Security, 16(12), 132-138, 2016.

Ahmed, E.; Yaqoob, I.; Gani, A.; Imran, M.; Guizani, M. (2016). Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges, IEEE Wireless Communications, 23(5), 10-16, 2016.

Alrajeh, N. A.; Khan, S.; Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review, International Journal of Distributed Sensor Networks, 1-7, 2013.

Alshehri, A.; Sandhu, R. (2016). Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In: Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on, 530-538, 2016.

Bucerzan, D.; Cayrel, P.-L.; Dragoi, V.; Richmond, T. (2017). Improved Timing Attacks against the Secret Permutation in the McEliece PKC, International Journal of Computers Communications & Control, 12(1), 7-25, 2017.

Butun, I.; Morgera, S. D.; Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks, IEEE Communications Surveys & Tutorials, 16(1), 266-282, 2014.

Creech, G.; Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns, IEEE Transactions on Computers, 63(4), 807-819, 2014.

Elhag, S.; Ferná ndez, A.; Bawakid, A.; Alshomrani, S.; Herrera, F. (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems, Expert Systems with Applications, 42(1), 193-202, 2015.

Elkhodr, M.; Shahrestani, S.; Cheung, H. (2016). The internet of things: new interoperability, management and security challenges. arXiv preprint arXiv:1604.04824.

Han, G.; Shu, L.; Chan, S.; Hu, J. (2016). Security and privacy in Internet of things: methods, architectures, and solutions. Security and Communication Networks, 9(15), 2641- 2642, 2016.

Gong, W. (2016). The Internet of Things (IoT): what is the potential of the internet of things (IoT) as a marketing tool?, Bachelor's Thesis, University of Twente, 2016.

Gunasekaran, A.; Subramanian, N.; Tiwari, M.K. (2016). Information technology governance in Internet of Things supply chain networks, Industrial Management & Data Systems, 116.7, 2016.

Kim, G.; Lee, S.; Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690- 1700, 2014.

Madakam, S.; Date, H. (2016). Security Mechanisms for Connectivity of Smart Devices in the Internet of Things, In Connectivity Frameworks for Smart Devices (pp. 23-41). Springer International Publishing.

McKelvey, B.; Tanriverdi, H.; Yoo, Y. (2016). Complexity and Information Systems Research in the Emerging Digital World. MIS Quarterly.

Mitchell, R.; Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 55, 2014.

Moshtaghi, M.; Erfani, S. M.; Leckie, C.; Bezdek, J. C. (2017). Exponentially Weighted Ellipsoidal Model for Anomaly Detection. International Journal of Intelligent Systems, 32(9), 881-899, 2017.

Niu, J.; Jin, Y.; Lee, A.J.; Sandhu, R.; Xu, W.; Zhang, X. (2016). Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. In Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 49-50, 2016.

Samaila, M. G.; Neto, M.; Fernandes, D. A.; Freire, M. M.; Iná cio, P. R. (2017). Security Challenges of the Internet of Things, Beyond the Internet of Things, 53-82, 2017.

Singh, M.; Rajan, M. A.; Shivraj, V. L.; Balamuralidhar, P. (2015). Secure mqtt for internet of things (iot). In: Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, IEEE, 746-751, 2015.

Tariq, U.; Aldaej A. (2018). Outlook of Coordinated Transmission Control in 5G Networks for IoTs, International Journal of Computers Communications & Control, 13(2), 280-293, 2018.

Tellez, M.; El-Tawab, S.; Heydari, H. M. (2016). Improving the security of wireless sensor networks in an IoT environmental monitoring system. In Systems and Information Engineering Design Symposium (SIEDS), 2016 IEEE, 72-77, 2016.

Xu, K.; Qu, Y.; Yang, K. (2016). A tutorial on the internet of things: from a heterogeneous network integration perspective, IEEE Network, 30(2), 102-108, 2016.

Zheng, Z.; Xie, S.; Dai, H. N.; Wang, H. (2016). Blockchain Challenges and Opportunities: A Survey, Int. J. Web and Grid Services, 14(4), 2018.

Zhao, S.; Cheng, B.; Yu, L.; Hou, S. L.; Zhang, Y.; Chen, J. L. (2016). Internet of Things Service Provisioning Platform for Cross-Application Cooperation, International Journal of Web Services Research (IJWSR), 13(1), 1-22, 2016.



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.