An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection

Abstract The extensive promotion of Internet of Thing (IoT), provides assorted opportunities and benefits in wide aspect of our life but unfortunately, the IoT is associated with various kinds of vulnerability attacks and anomaly exploits. Security experts indicate voluminous risks enforced by the IoT devices in different aspects. So, the attacks and anomaly detection become a growing concern in this sector. Disparate attacks allied Malicious Control, Denial of Service, Malicious Operations, Scan, Data Type Probing, Wrong Setup and spying becomes the severe cause of IoT system failure. The main objective of these attacks has to steal the confidential information from the system and generates unavailability of the system for authorized users. As compulsion of IoT security, we proposed a novel ensemble hyper-tuned model that automatically and effectively detects IoT sensors attacks and anomalies. This robust model is built on the basis of feature selection and ensemble technique of Machine Learning. The virtual IoT sensor’s environment generates a dataset by Distributed Smart Space Orchestration System (DS2OS), that is used for performing the experiments of attack detection by hyper-tuned Gradient Boosting ensemble algorithm. First, the feature selection process is applied for reducing the dimensions of the dataset, which enrich the environment for attacks and anomaly detection. After that, Gradient Boosting ensemble algorithm is applied with little hyperparameter tuning for getting the best results. Our model is outperformed for detecting the attacks on IoT sensor’s environment and effectiveness of this model is measured in terms of Accuracy = 99.40%, Precision = 99%, Recall = 99%, F1-Score = 99%. whereas, the ROC-AUC curve and confusion matrix is also generated for predicting the efficiency of our ensemble model.

[1]  Jaime Lloret,et al.  Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.

[2]  Angelos Stavrou,et al.  Malicious PDF detection using metadata and structural features , 2012, ACSAC '12.

[3]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[4]  M. M. A. Hashem,et al.  Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.

[5]  Michal Choras,et al.  A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..

[6]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[7]  Yun-Peng Zhang,et al.  Design of a wearable human-computer interaction system based on bioelectrical signal recognition technology , 2018 .

[8]  Khaleel Ahmad,et al.  AES and MQTT based security system in the internet of things , 2019 .

[9]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[10]  Junia Valente,et al.  Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices , 2019, IEEE Security & Privacy.

[11]  Nasir Ghani,et al.  A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[12]  Anastasios A. Economides,et al.  EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).

[13]  Gurusamy Mohan,et al.  Dynamic attack detection and mitigation in IoT using SDN , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[14]  Vinita Malik,et al.  Security risk management in IoT environment , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[15]  Elena Sitnikova,et al.  Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques , 2017, MONAMI.

[16]  Erol Gelenbe,et al.  Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.

[17]  Hannu Tenhunen,et al.  An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .

[18]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[19]  Ying Wang,et al.  Intelligent community medical service based on internet of things , 2018, Journal of Interdisciplinary Mathematics.

[20]  J. Manyika,et al.  Disruptive technologies: Advances that will transform life, business, and the global economy , 2013 .

[21]  Kun Yang,et al.  A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework , 2018, IEEE Access.

[22]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[23]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[24]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[25]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[26]  Heejo Lee,et al.  On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.

[27]  Gayatri Sakya,et al.  WSN and IoT based smart city model using the MQTT protocol , 2019 .

[28]  Iftikhar Ahmad,et al.  Application of artificial neural network in detection of probing attacks , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.

[29]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[30]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[31]  Ramesh Karri,et al.  Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[32]  Pavan Pongle,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[33]  Muttukrishnan Rajarajan,et al.  Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks , 2019, Secur. Commun. Networks.