Affiliation:
1. Department of Computer Science, Sultan Qaboos University, Muscat P.O. Box 36, Oman
Abstract
Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of the promising protocols designed for the IoT networks. However, due to the constrained nature of the IoT devices in terms of memory, processing power, and network capabilities, they are exposed to many security attacks. Unfortunately, the existing Intrusion Detection System (IDS) approaches using machine learning that have been proposed to detect and mitigate security attacks in internet networks are not suitable for analyzing IoT traffics. This paper proposed an IDS system using the hybridization of supervised and semi-supervised deep learning for network traffic classification for known and unknown abnormal behaviors in the IoT environment. In addition, we have developed a new IoT specialized dataset named IoTR-DS, using the RPL protocol. IoTR-DS is used as a use case to classify three known security attacks (DIS, Rank, and Wormhole). The proposed Hybrid DL-Based IDS is evaluated and compared to some existing ones, and the results are promising. The evaluation results show an accuracy detection rate of 98% and 92% in f1-score for multi-class attacks when using pre-trained attacks (known traffic) and an average accuracy of 95% and 87% in f1-score when predicting untrained attacks for two attack behaviors (unknown traffic).
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference33 articles.
1. Thamilarasu, G., and Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19.
2. RPL: IPv6 routing protocol for low-power and lossy networks;Winter;Net. Architect. Serv.,2012
3. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review;Verma;IEEE Sens. J.,2020
4. A Taxonomy of Attacks in RPL-based Internet of Things;Mayzaud;Int. J. Netw. Secur.,2016
5. A survey: Intrusion detection techniques for internet of things;Choudhary;Int. J. Inf. Secur. Priv. (IJISP),2019
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献