Research on immunity-based intrusion detection technology for the Internet of Things

Author(s):  
Caiming Liu ◽  
Jin Yang ◽  
Run Chen ◽  
Yan Zhang ◽  
Jinquan Zeng
2011 ◽  
Vol 366 ◽  
pp. 165-168 ◽  
Author(s):  
Run Chen ◽  
Cai Ming Liu ◽  
Chao Chen

Traditional detection technology for network attacks is difficult to adapt the complicated and changeful environment of the Internet of Things (IoT). In the interest of resolving the distributed intrusion detection problem of IoT, this paper proposes an artificial immune-based theory model for distributed intrusion detection in IoT. Artificial immune principles are used to solve the problem of IoT intrusion detection. Antigen, self, non-self and detector in the IoT environment are defined. Good immune mechanisms are simulated. Detector is evolved dynamically to make the proposed model have self-learning and self-adaptation. The outstanding detectors which have accepted training are shared in the whole IoT to adapt the local IoT environment and improve the ability of global intrusion detection in IoT. The proposed model is expected to realize detecting intrusion of IoT in distribution and parallelity.


2012 ◽  
Vol 562-564 ◽  
pp. 1982-1985 ◽  
Author(s):  
Cai Ming Liu ◽  
Yan Zhang ◽  
Run Chen ◽  
Lu Xin Xiao ◽  
Jian Dong Zhang

The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion detection technology for IoT security threats. An intrusion detection method based on the clone selection principle is proposed in this paper. The key elements in the clone selection theory are simulated. The clone selection algorithm is realized to be applied in IoT. Detection elements for security threats evolve to adapt the real IoT environment. The proposed method is expected to improve the detection efficiency of IoT security threats.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 1977 ◽  
Author(s):  
Geethapriya Thamilarasu ◽  
Shiven Chawla

Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.


Sign in / Sign up

Export Citation Format

Share Document