NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks

Internet of Things (IoT) makes physical objects and devices interact with each other through wireless technologies. IoT is expected to deliver a significant role in our lives in near future. However, at the current stage, IoT is vulnerable to various kinds of security threats just like other wired and wireless networks. Our work mainly focuses on protecting an IoT infrastructure from distributed denial-of-service attacks generated by the intruders. We present a new approach of using Naïve Bayes classification algorithm applied in intrusion detection systems (IDSs). IDSs are deployed in the form of multi-agents throughout the network to sense the misbehaving or irregular traffic and actions of nodes. In the paper, we also discuss the fundamental concepts related to our work and recent research done in similar area.

[1]  Gregorio Martínez Pérez,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011 .

[2]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[3]  Houbing Song,et al.  ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..

[4]  Jinquan Zeng,et al.  Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.

[5]  Salwani Abdullah,et al.  Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks , 2018, IEEE Access.

[6]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[7]  Jaime Lloret,et al.  A secure and low-energy zone-based wireless sensor networks routing protocol for pollution monitoring , 2016, Wirel. Commun. Mob. Comput..

[8]  Paul Fremantle,et al.  A security survey of middleware for the Internet of Things , 2015 .

[9]  Houbing Song,et al.  SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks , 2016, Secur. Commun. Networks.

[10]  Jaydip Sen,et al.  An Agent-Based Intrusion Detection System for Local Area Networks , 2010, Int. J. Commun. Networks Inf. Secur..

[11]  Mahdi H. Miraz,et al.  A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).

[12]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[13]  Hassan Bevrani,et al.  Multi-agent systems in control engineering: a survey , 2009 .

[14]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[15]  Waqas Aman Assessing the Feasibility of Adaptive Security Models for the Internet of Things , 2016, HCI.

[16]  Muhammad Waseem,et al.  A Review on Internet of Things (IoT) , 2015 .

[17]  Wei Kuang Lai,et al.  A Machine Learning System for Routing Decision-Making in Urban Vehicular Ad Hoc Networks , 2015, Int. J. Distributed Sens. Networks.

[18]  Richard Tynan,et al.  Autonomic wireless sensor networks , 2004, Eng. Appl. Artif. Intell..

[19]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[20]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[21]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[22]  Jiafu Wan,et al.  Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.

[23]  Muhammad Nasuha Mansor,et al.  The Potential of Radio Frequency Identification (RFID) Technology Implementation in Malaysian Shipbuilding Industry , 2015 .

[24]  Fatiha Djemili Tolba,et al.  MASID: Multi-Agent System for Intrusion Detection in MANET , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[25]  K. Venugopal Rao,et al.  DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey , 2014 .

[26]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[27]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[28]  Busra Ozdenizci,et al.  A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.

[29]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[30]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[31]  Houbing Song,et al.  ESBL: An Energy-Efficient Scheme by Balancing Load in Group Based WSNs , 2016, KSII Trans. Internet Inf. Syst..

[32]  Klaus Kabitzsch,et al.  Performance analysis of the EnOcean wireless sensor network protocol , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).

[33]  Houbing Song,et al.  ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks , 2017, Ad Hoc Networks.

[34]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[35]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[36]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[37]  Omar Said Development of an Innovative Internet of Things Security System , 2013 .