Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems

The rapidly increasing volume of lightweight devices in Internet of Things (IoT) environment needs a strong Intrusion Detection System (IDS). Conventional IDS cannot be applied directly in IoT networks due to various communication architectures, standards, technologies, and environment specific services. The main problem with current IDS and handling techniques is that they can’t adapt to service changes in real-time. To overcome this open challenge, adaptive hybrid IDS based on timed automata controller approach is proposed in this paper. Proposed Hybrid IDS have additional knowledge in relation to frequent multimedia file formats and use this knowledge to carry out a comprehensive analysis of packets carrying multimedia files. Crowd sourcing online repository for signature based malicious pattern set generation is designed and self-tuning timed automaton is developed to detect the intruder in IoT networks. From the experimental results, it is evident that our proposed method, an adaptive hybrid IDS suit smart city applications and are accurate (99.06%) in detecting Denial of Service (DoS) attacks, control hijacking attacks, zero day attacks, and replay attacks in IoT environments.

[1]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[2]  Rajeev Alur,et al.  A Theory of Timed Automata , 1994, Theor. Comput. Sci..

[3]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[4]  Christopher Krügel,et al.  Anomalous system call detection , 2006, TSEC.

[5]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[6]  Yu Chen,et al.  Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[7]  Yan Fu,et al.  Investigating the Temporal Effect of User Preferences with Application in Movie Recommendation , 2017, Mob. Inf. Syst..

[8]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[9]  Mohamed Hefeeda,et al.  Dynamic input anomaly detection in interactive multimedia services , 2018, MMSys.

[10]  Ding-Zhu Du,et al.  Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..

[11]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[12]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[13]  Yang Xiao,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..

[14]  P. Arun Raj Kumar,et al.  Improving Adhoc wireless sensor networks security using distributed automaton , 2018, Cluster Computing.

[15]  Jana Krimmling,et al.  Integration and evaluation of intrusion detection for CoAP in smart city applications , 2014, 2014 IEEE Conference on Communications and Network Security.

[16]  Gang Wang,et al.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.

[17]  Jin Cao,et al.  An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..

[18]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[19]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[20]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[21]  Tom Fawcett,et al.  Robust Classification for Imprecise Environments , 2000, Machine Learning.

[22]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[23]  Ahod Alghuried,et al.  A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree. , 2017 .

[24]  Guangjie Han,et al.  Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[25]  EMMANOUIL VASILOMANOLAKIS,et al.  Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..

[26]  Craig A. Knoblock,et al.  A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..

[27]  Christopher Leckie,et al.  Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..

[28]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[29]  Mauro Conti,et al.  RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[30]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[31]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[32]  FischerMathias,et al.  Taxonomy and Survey of Collaborative Intrusion Detection , 2015 .