A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures

Author(s):  
Salma Abdalla Hamad ◽  
Quan Z. Sheng ◽  
Dai Hoang Tran ◽  
Wei Emma Zhang ◽  
Surya Nepal
Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 31-36
Author(s):  
A. Marochkina ◽  
А. Paramonov

The area of application for the Internet of Things networks is vast. One of the main uses for such a net-work is the organization of network traffic. A traffic stream can be considered as a self-organizing net-work with moving nodes. This article describes the various features of such networks. Models with vari-ous mobility, velocity and density parameters of nodes are considered for studying the routes in this networks.


Author(s):  
Xiaoni Wang ◽  
◽  

Through ad hoc routing protocol AODVjr and resource-aware data mining algorithms research, a resource-aware clustering based routing protocol in the Internet of Things, RA-AODVjr, is proposed. It solves the short comings of the constrained resources of memory, computing power, and the power energy of the wireless sensor’s terminal node in the Internet of Things. RA-AODVjr protocol is designed combining with the RA-cluster and AODVjr routing protocol. This protocol selects the best neighbor in the terminal node and balances the network traffic when terminal node resource is constrained, using the relevance of the ad hoc network. The simulation results show that the agreement achieves load balancing of energy constrained nodes to a certain extent. Compared with the original AODVjr protocol, due to the best neighbor node delivery technology, the local network traffic gets a better balance and less time delay means better choice of routing.


2021 ◽  
Vol 2 (4) ◽  
pp. 1-23
Author(s):  
Morshed Chowdhury ◽  
Biplob Ray ◽  
Sujan Chowdhury ◽  
Sutharshan Rajasegarar

Due to the widespread functional benefits, such as supporting internet connectivity, having high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) has become popular and used in many applications, such as for smart city, smart health, smart home, and smart vehicle realizations. These IoT-based systems contribute to both daily life and business, including sensitive and emergency situations. In general, the devices or sensors used in the IoT have very limited computational power, storage capacity, and communication capabilities, but they help to collect a large amount of data as well as maintain communication with the other devices in the network. Since most of the IoT devices have no physical security, and often are open to everyone via radio communication and via the internet, they are highly vulnerable to existing and emerging novel security attacks. Further, the IoT devices are usually integrated with the corporate networks; in this case, the impact of attacks will be much more significant than operating in isolation. Due to the constraints of the IoT devices, and the nature of their operation, existing security mechanisms are less effective for countering the attacks that are specific to the IoT-based systems. This article presents a new insider attack, named loophole attack , that exploits the vulnerabilities present in a widely used IPv6 routing protocol in IoT-based systems, called RPL (Routing over Low Power and Lossy Networks). To protect the IoT system from this insider attack, a machine learning based security mechanism is presented. The proposed attack has been implemented using a Contiki IoT operating system that runs on the Cooja simulator, and the impacts of the attack are analyzed. Evaluation on the collected network traffic data demonstrates that the machine learning based approaches, along with the proposed features, help to accurately detect the insider attack from the network traffic data.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2985
Author(s):  
Segun I. Popoola ◽  
Bamidele Adebisi ◽  
Ruth Ande ◽  
Mohammad Hammoudeh ◽  
Kelvin Anoh ◽  
...  

Nowadays, hackers take illegal advantage of distributed resources in a network of computing devices (i.e., botnet) to launch cyberattacks against the Internet of Things (IoT). Recently, diverse Machine Learning (ML) and Deep Learning (DL) methods were proposed to detect botnet attacks in IoT networks. However, highly imbalanced network traffic data in the training set often degrade the classification performance of state-of-the-art ML and DL models, especially in classes with relatively few samples. In this paper, we propose an efficient DL-based botnet attack detection algorithm that can handle highly imbalanced network traffic data. Specifically, Synthetic Minority Oversampling Technique (SMOTE) generates additional minority samples to achieve class balance, while Deep Recurrent Neural Network (DRNN) learns hierarchical feature representations from the balanced network traffic data to perform discriminative classification. We develop DRNN and SMOTE-DRNN models with the Bot-IoT dataset, and the simulation results show that high-class imbalance in the training data adversely affects the precision, recall, F1 score, area under the receiver operating characteristic curve (AUC), geometric mean (GM) and Matthews correlation coefficient (MCC) of the DRNN model. On the other hand, the SMOTE-DRNN model achieved better classification performance with 99.50% precision, 99.75% recall, 99.62% F1 score, 99.87% AUC, 99.74% GM and 99.62% MCC. Additionally, the SMOTE-DRNN model outperformed state-of-the-art ML and DL models.


2020 ◽  
Vol 3 (4) ◽  
pp. 40-45
Author(s):  
Mohammad Hammoudeh ◽  
John Pimlott ◽  
Sana Belguith ◽  
Gregory Epiphaniou ◽  
Thar Baker ◽  
...  

2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


2019 ◽  
Vol 14 (5) ◽  
pp. 375
Author(s):  
Vladimir P. Zhalnin ◽  
Anna S. Zakharova ◽  
Demid A. Uzenkov ◽  
Andrey I. Vlasov ◽  
Alexey I. Krivoshein ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document