A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things

Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann
Author(s):  
Ozgur Koray Sahingoz ◽  
Ugur Cekmez ◽  
Ali Buldu

With the development of sensor and communication technologies, the use of connected devices in industrial applications has been common for a long time. Reduction of costs during this period and the definition of Internet of Things (IoTs) concept have expanded the application area of small connected devices to the level of end-users. This paved the way for IoT technology to provide a wide variety of application alternative and become a part of daily life. Therefore, a poorly protected IoT network is not sustainable and has a negative effect on not only devices but also the users of the system. In this case, protection mechanisms which use conventional intrusion detection approaches become inadequate. As the intruders’ level of expertise increases, identification and prevention of new kinds of attacks are becoming more challenging. Thus, intelligent algorithms, which are capable of learning from the natural flow of data, are necessary to overcome possible security breaches. Many studies suggesting models on individual attack types have been successful up to a point in recent literature. However, it is seen that most of the studies aiming to detect multiple attack types cannot successfully detect all of these attacks with a single model. In this study, it is aimed to suggest an all-in-one intrusion detection mechanism for detecting multiple intrusive behaviors and given network attacks. For this aim, a custom deep neural network is designed and implemented to classify a number of different types of network attacks in IoT systems with high accuracy and F1-score. As a test-bed for comparable results, one of the up-to-date dataset (CICIDS2017), which is highly imbalanced, is used and the reached results are compared with the recent literature. While the initial propose was successful for most of the classes in the dataset, it was noted that achievement was low in classes with a small number of samples. To overcome imbalanced data problem, we proposed a number of augmentation techniques and compared all the results. Experimental results showed that the proposed methods yield highest efficiency among observed literature.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Dapeng Man ◽  
Fanyi Zeng ◽  
Wu Yang ◽  
Miao Yu ◽  
Jiguang Lv ◽  
...  

As an innovative strategy, edge computing has been considered a viable option to address the limitations of cloud computing in supporting the Internet-of-Things applications. However, due to the instability of the network and the increase of the attack surfaces, the security in edge-assisted IoT needs to be better guaranteed. In this paper, we propose an intelligent intrusion detection mechanism, FedACNN, which completes the intrusion detection task by assisting the deep learning model CNN through the federated learning mechanism. In order to alleviate the communication delay limit of federal learning, we innovatively integrate the attention mechanism, and the FedACNN can achieve ideal accuracy with a 50% reduction of communication rounds.


2011 ◽  
Vol 366 ◽  
pp. 165-168 ◽  
Author(s):  
Run Chen ◽  
Cai Ming Liu ◽  
Chao Chen

Traditional detection technology for network attacks is difficult to adapt the complicated and changeful environment of the Internet of Things (IoT). In the interest of resolving the distributed intrusion detection problem of IoT, this paper proposes an artificial immune-based theory model for distributed intrusion detection in IoT. Artificial immune principles are used to solve the problem of IoT intrusion detection. Antigen, self, non-self and detector in the IoT environment are defined. Good immune mechanisms are simulated. Detector is evolved dynamically to make the proposed model have self-learning and self-adaptation. The outstanding detectors which have accepted training are shared in the whole IoT to adapt the local IoT environment and improve the ability of global intrusion detection in IoT. The proposed model is expected to realize detecting intrusion of IoT in distribution and parallelity.


Sign in / Sign up

Export Citation Format

Share Document