Affiliation:
1. Department of Computer Networks and Communications, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia
2. King Abdullah the II IT School, The University of Jordan, Amman 11942, Jordan
3. Faculty of Information Technology, Applied Science Private University, Amman 11931, Jordan
4. Department of Computer Science, Aqaba University of Technology, Aqaba 11191, Jordan
Abstract
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without requiring manual intervention or setup. Users’ security and privacy may be compromised by attackers seeking to obtain access to their personal information, create monetary losses, and spy on them. A Denial of Service (DoS) attack is one of the most devastating attacks against IoT systems because it prevents legitimate users from accessing services. A cyberattack of this type can significantly damage IoT services and smart environment applications in an IoT network. As a result, securing IoT systems has become an increasingly significant concern. Therefore, in this study, we propose an IDS defense mechanism to improve the security of IoT networks against DoS attacks using anomaly detection and machine learning (ML). Anomaly detection is used in the proposed IDS to continuously monitor network traffic for deviations from normal profiles. For that purpose, we used four types of supervised classifier algorithms, namely, Decision Tree (DT), Random Forest (RF), K Nearest Neighbor (kNN), and Support Vector Machine (SVM). In addition, we utilized two types of feature selection algorithms, the Correlation-based Feature Selection (CFS) algorithm and the Genetic Algorithm (GA) and compared their performances. We also utilized the IoTID20 dataset, one of the most recent for detecting anomalous activity in IoT networks, to train our model. The best performances were obtained with DT and RF classifiers when they were trained with features selected by GA. However, other metrics, such as training and testing times, showed that DT was superior.
Reference49 articles.
1. Effective anomaly detection using deep learning in IoT systems;Aversano;Wirel. Commun. Mob. Comput.,2021
2. Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12.
3. Machine learning based intrusion detection systems for IoT applications;Verma;Wirel. Pers. Commun.,2020
4. Idrissi, I., Azizi, M., and Moussaoui, O. (2020, January 21–23). IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review. Proceedings of the 2020 Fourth International Conference on Intelligent Computing in Data Sciences (ICDS), Fez, Morocco.
5. Ioulianou, P., Vasilakis, V., Moscholios, I., and Logothetis, M. (Inf. Commun. Technol. Form., 2018). A signature-based intrusion detection system for the internet of things, Inf. Commun. Technol. Form., in press.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献