skip to main content
10.1145/3395352.3402621acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset

Published:16 July 2020Publication History

ABSTRACT

Wide adoption of Internet of Things (IoT) devices and applications encounters security vulnerabilities as roadblocks. The heterogeneous nature of IoT systems prevents common benchmarks, such as the NSL-KDD dataset, from being used to test and verify the performance of different Network Intrusion Detection Systems (NIDS). In order to bridge this gap, in this paper, we examine specific attacks in the NSL-KDD dataset that can impact sensor nodes and networks in IoT settings. Furthermore, in order to detect the introduced attacks, we study eleven machine learning algorithms and report the results. Through numerical analysis, we show that tree-based methods and ensemble methods outperform the rest of the studied machine learning methods. Among the supervised algorithms, XGBoost ranks the first with 97% accuracy, 90.5% Matthews correlation coefficient (MCC), and 99.6% Area Under the Curve (AUC) performance. Moreover, a notable research finding of this study is that the Expectation-Maximization (EM) algorithm, which is an unsupervised method, also performs reasonably well in the detection of the attacks in the NSL-KDD dataset and outperforms the accuracy of the Naïve Bayes classifier by 22.0%.

References

  1. Iman Almomani, Bassam Al-Kasasbeh, and Mousa AL-Akhras. 2016. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks.Google ScholarGoogle Scholar
  2. Hazim Almuhimedi et al. 2015. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In ACM Conf. Human Fact, in Comp. Sys. Seoul, Korea, 787--796.Google ScholarGoogle Scholar
  3. Ethem Alpaydin. 2020. Introduction to Machine Learning (fourth edition edition ed.). The MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  4. Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In ACM SIGKDD Int Conf. on Knowledge Discovery and Data Mining. San Francisco, CA, USA, 785--794.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Davide Chicco and Giuseppe Jurman. 2020. The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21 (Jan. 2020).Google ScholarGoogle Scholar
  6. G. Dong, Y. Jin, S. Wang, W. Li, Z. Tao, and S. Guo. 2019. DB-Kmeans:An Intrusion Detection Algorithm Based on DBSCAN and K-means. In 20th APNOMS Symposium. 1--4.Google ScholarGoogle Scholar
  7. A. Dunkels, B. Gronvall, and T. Voigt. 2004. Contiki - a lightweight and flexible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks. 455--462. ISSN: 0742-1303.Google ScholarGoogle Scholar
  8. Fatma Gara, Leila Ben Saad, and Rahma Ben Ayed. 2017. An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In Int. Wireless Communications and Mobile Computing Conf. 276--281.Google ScholarGoogle ScholarCross RefCross Ref
  9. Mahmudul Hasan, Md. Milon Islam, Md Ishrak Islam Zarif, and M. M. A. Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7 (Sept. 2019), 100059.Google ScholarGoogle Scholar
  10. Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, and Robert Atkinson. 2016. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Int. Symp. on Networks, Comp. and Comm. Yasmine Hammamet, TUN, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  11. Khalid Hussain, Syed Jawad Hussain, NZ Jhanjhi, and Mamoona Humayun. 2019. SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET. In Int. Conf. on Computer and Information Sci. (ICCIS). 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  12. Kamaldeep, M. Malik, and M. Dutta. 2017. Contiki-based mitigation of UDP flooding attacks in the Internet of things. In Int. Conf. on Comp., Comm. and Automation. 1296--1300.Google ScholarGoogle Scholar
  13. Nattawat Khamphakdee, Nunnapus Benjamas, and Saiyan Saiyod. 2014. Improving Intrusion Detection System based on Snort rules for network probe attack detection. In Int. Conf. on Information and Communication Technology. 69--74.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. C. Khor, C. Y. Ting, and S. Phon-Amnuaisuk. 2010. Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection. In Int. Conf. on Computer Engineering and Applications, Vol. 2. 325--329.Google ScholarGoogle Scholar
  15. Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gen. Comp. Sys. 100 (Nov. 2019), 779--796.Google ScholarGoogle Scholar
  16. N. Lower and F. Zhan. 2020. A Study of Ensemble Methods for Cyber Security. In Computing and Communication Workshop and Conf. 1001--1009.Google ScholarGoogle Scholar
  17. Marc-Oliver Pahl and François-Xavier Aubet. 2018. All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection. In 14th International Conf. on Network and Service Management (CNSM). 72--80. ISSN: 2165-9605.Google ScholarGoogle Scholar
  18. Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans, on Emerging Topics in Computing 7 (April 2019), 314--323.Google ScholarGoogle ScholarCross RefCross Ref
  19. Nadun Rajasinghe, Jagath Samarabandu, and Xianbin Wang. 2018. INSECS-DCS: A Highly Customizable Network Intrusion Dataset Creation Framework. In IEEE CCECE,. 1--4.Google ScholarGoogle Scholar
  20. Rongrong Fu, Kangfeng Zheng, Dongmei Zhang, and Yixian Yang. 2011. An intrusion detection scheme based on anomaly mining in Internet of Things. In IET Int. Conf. on Wireless, Mobile & Multimedia Networks. 315--320.Google ScholarGoogle Scholar
  21. Yalin E. Sagduyu, Yi Shi, and Tugba Erpek. 2019. IoT Network Security from the Perspective of Adversarial Deep Learning. In IEEE Int. Conf. on Sensing, Commu., and Networking. 1--9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Mustapha Réda Senouci, Abdelhamid Mellouk, and Amar Aissani. 2014. Random deployment of wireless sensor networks: a survey and approach. Int. J. Ad Hoc Ubiquitous Comp. (2014).Google ScholarGoogle ScholarCross RefCross Ref
  23. Muhammad Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, and Mohsen Guizani. 2020. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Generation Computer Systems 107 (June 2020), 433--442.Google ScholarGoogle Scholar
  24. Subrina Sultana, Sumaiya Nasrin, Farhana Kabir Lipi, Md Afzal Hossain, Zinia Sultana, and Fatima Jannat. 2019. Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism. In Int. Conf. on Comp., Comm., Chemical, Materials and Electronic Eng. (IC4ME2). 1--6.Google ScholarGoogle Scholar
  25. Syeda Manjia Tahsien, Hadis Karimipour, and Petros Spachos. 2020. Machine learning based solutions for security of Internet of Things (IoT): A survey. Journal of Network and Computer Applications 161 (2020), 102630.Google ScholarGoogle ScholarCross RefCross Ref
  26. Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh. 2018. Analysis of ping of death DoS and DDoS attacks. In IEEE Long Island Sys., Applications and Technology Conf. 1--4.Google ScholarGoogle Scholar
  27. Gholam Reza Zargar and Peyman Kabiri. 2009. Identification of effective network features to detect Smurf attacks. In IEEE Student Conf. on Research and Development. 49--52.Google ScholarGoogle ScholarCross RefCross Ref
  28. Congyingzi Zhang and Robert Green. 2015. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In 18th Symposium on Communications & Networking. Alexandria, VA, 8--15.Google ScholarGoogle Scholar
  29. Yüksel Öner and Hasan Bulut. 2020. A robust EM clustering approach: ROBEM. Communications in Statistics - Theory and Methods 0, 0 (Feb. 2020). Publisher: Taylor & Francis.Google ScholarGoogle Scholar

Index Terms

  1. Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              WiseML '20: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning
              July 2020
              91 pages
              ISBN:9781450380072
              DOI:10.1145/3395352

              Copyright © 2020 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 July 2020

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader