Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms

In this research, a real-world simulation service uses Internet of Things (IoT) capable objects to detect behavioral-based anomalies within a simulated smart home/vicinity. In the simulation, the smart home and the surrounding world are monitored with a behavioral modeling intrusion detection system (BMIDS). The BMIDS uses immunity-inspired algorithms to distinguish whether behavioral patterns extracted match a desired behavior or indicate deviation from the desired behavior. The simulation is used to monitor and scale all relevant activity in order to verify construction of accurate behavioral models. The BMIDS demonstrates how the capture of IoT sensor data activity concatenated as a set of event sequences along with the simulated world state provide the components to establish a numerical representation for behavioral identity. Creating behavioral models via pervasive system monitoring prior to and alongside cyber-physical system experimentation with the BMIDS simulation is cost efficient, easily verifiable and promotes autonomous monitoring for an autonomic monitoring mechanism. Also, performance measurements can be scaled more accurately during qualitative and quantitative analysis, thus producing the desired behavior model as depicted by the specified scripted or non-scripted behavior.

[1]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[2]  Albert C. Esterline,et al.  An Autonomic Computing System based on a Rule-based Policy Engine and Artificial Immune Systems , 2016, MAICS.

[3]  Paul A. Fishwick,et al.  An introduction to OpenSimulator and virtual environment agent-based M&S applications , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).

[4]  Zhou Cheng,et al.  Overview of the Internet of Things , 2011 .

[5]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[6]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[7]  R. Abelson Psychological status of the script concept. , 1981 .

[8]  Jyotsna P. Gabhane,et al.  A survey based on Smart Homes system using Internet-of-Things , 2015, 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).

[9]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[10]  A. Engelbrecht Computational Intelligence: An Introduction, Second Edition , 2007 .

[11]  J. Gibson The Ecological Approach to Visual Perception , 1979 .