Mobile network intrusion detection for IoT system based on transfer learning algorithm

The open deployment environment and limited resources of the Internet of things (IoT) make it vulnerable to malicious attacks, while the traditional intrusion detection system is difficult to meet the heterogeneous and distributed features of the Internet of things. The security and privacy protection of IoT is directly related to the practical application of IoT. In this paper, We analyze the characteristics of networking security and security problems, and discuss the system framework of Internet security and some key security technologies, including key management, authentication and access control, routing security, privacy protection, intrusion detection and fault tolerance and intrusion etc. This paper introduces the current problems of IoT in network security, and points out the necessity of intrusion detection. Several kinds of intrusion detection technologies are discussed, and its application on IoT architecture is analyzed. We compare the application of different intrusion detection technologies, and make a prospect of the next phase of research. Using data mining and machine learning methods to study network intrusion technology has become a hot issue. A single class feature or a detection model is very difficult to improve the detection rate of network intrusion detection. The performance of the proposed model is validated through the public databases.

[1]  Wei Gui-ying Cipher algorithm in data transmission of RFID system on the internet for things , 2009 .

[2]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[3]  胡炳樑 Hu Bingliang,et al.  Research on dynamic tracking and compensation method for hyperspectral interference imaging , 2016 .

[4]  Liu Wen-tao Network Intrusion Detection Based on Improved Genetic Algorithm , 2010 .

[5]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[6]  Huan Liu,et al.  Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.

[7]  Suat Özdemir,et al.  Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.

[8]  Nigel P. Smart,et al.  Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems , 2009, IMACC.

[9]  Geoff Mulligan,et al.  The Internet of Things: Here Now and Coming Soon , 2010 .

[10]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[11]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[12]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[13]  Andrew H. Sung,et al.  Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques , 2003, Int. J. Digit. EVid..

[14]  P. Ning,et al.  Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .

[15]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[16]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[17]  Suat Ozdemir,et al.  Secure and reliable data aggregation for wireless sensor networks , 2007 .