Averaged dependence estimators for DoS attack detection in IoT networks

Abstract Wireless sensor networks (WSNs) have evolved to become an integral part of the contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing phenomena in their immediate environments and reporting their findings to a centralized base station (BS) have remained a core platform to sustain heterogeneous service-centric applications. However, the adversarial threat to the sensors of the IoT paradigm remains significant. Denial of service (DoS) attacks, comprising a large volume of network packets, targeting a given sensor node(s) of the network, may cripple routine operations and cause catastrophic losses to emergency services. This paper presents an intelligent DoS detection framework comprising modules for data generation, feature ranking and generation, and training and testing. The proposed framework is experimentally tested under actual IoT attack scenarios, and the accuracy of the results is greater than that of traditional classification techniques.

[1]  Glenn A. Fink,et al.  Overview of Security and Privacy in Cyber‐Physical Systems , 2017 .

[2]  Craig Valli,et al.  Future challenges for smart cities: Cyber-security and digital forensics , 2017, Digit. Investig..

[3]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[4]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[5]  Christian Brecher,et al.  Industrial Internet of Things and Cyber Manufacturing Systems , 2017 .

[6]  Sabina Jeschke,et al.  Managing the Cyber Security Life‐Cycle of Smart Cities , 2017 .

[7]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[8]  Liangxiao Jiang,et al.  Attribute Value Weighted Average of One-Dependence Estimators , 2017, Entropy.

[9]  Miroslav Popovic,et al.  A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method , 2018, Comput. Electr. Eng..

[10]  Jie Wu,et al.  IoT Hierarchical Topology Strategy and Intelligentize Evaluation System of Diesel Engine in Complexity Environment , 2018, Sensors.

[11]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[12]  Feng Lin,et al.  Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory , 2019, IEEE Access.

[13]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[14]  Zubair A. Baig Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..

[15]  Zubair A. Baig,et al.  Distributed Denial of Service Attack Detection in Wireless Sensor Networks , 2008 .

[16]  Fabiano Hessel,et al.  Security Challenges in 5G-Based IoT Middleware Systems , 2016 .

[17]  Michel Dagenais,et al.  An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment , 2018, Journal of Cloud Computing.

[18]  Michael J. McGrath,et al.  Sensor Network Topologies and Design Considerations , 2013 .

[19]  A. M. Hay,et al.  The derivation of global estimates from a confusion matrix , 1988 .

[20]  Kamel Mohamed Faraoun,et al.  Neural Networks Learning Improvement using the K-Means Clustering Algorithm to Detect Network Intrusions , 2007 .

[21]  Geoffrey I. Webb,et al.  Not So Naive Bayes: Aggregating One-Dependence Estimators , 2005, Machine Learning.

[22]  Geoffrey I. Webb,et al.  Averaged One-Dependence Estimators , 2010, Encyclopedia of Machine Learning.

[23]  Erol Gelenbe,et al.  Stability of the Random Neural Network Model , 1990, Neural Computation.

[24]  Giancarlo Fortino,et al.  An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.

[25]  Ki-Il Kim,et al.  A Survey on Real-Time Communications in Wireless Sensor Networks , 2017, Wirel. Commun. Mob. Comput..

[26]  Tanmay De,et al.  Mathematical modelling of DDoS attack and detection using correlation , 2017 .

[27]  Marc Dacier,et al.  A framework for attack patterns' discovery in honeynet data , 2008 .