Data driven intrusion detection for 6LoWPAN based IoT systems

被引:2
|
作者
Ors, Faik Kerem [1 ,2 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkiye
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN USA
关键词
Internet of Things; Intrusion detection; Attack classification; Anomaly detection; Machine learning; ROUTING ATTACKS; INTERNET; NETWORKS;
D O I
10.1016/j.adhoc.2023.103120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wide adoption of Internet of Things (IoT) devices and their limitations in terms of hardware cause them to be easy targets for attackers. This, in turn, requires monitoring such systems using intrusion detection systems and take mitigative actions against insider and outsider attackers. Recent studies have explored that machine learning based intrusion detection systems are quite successful in detecting different types of cyber threats targeting IoT systems. However, the proposed systems in these studies incurred limitations in terms of the characteristics of their datasets and detection models. Specifically, a big proportion of the proposed models were developed using simulation-based data generated through specific simulators. Some of these studies also used previously published testbed data that contain the samples of outdated IoT attacks and vulnerabilities. Furthermore, they focused on a lower attack variety and proposed binary classifiers which do not scale in multi-attack scenarios. In this study, we propose a machine learning based multi-class classifier that can classify 6 attack types together with the benign traffic. Our node based feature extraction and detection methodology allows locating the network addresses of the attackers, rather than a rough network level attack existence information, by modeling their traffic characteristics over a sliding time window. For training and testing our models, we also propose an intrusion detection dataset generated using the traffic data collected from real IoT devices running with 6LoWPAN and RPL protocols. Besides having RPL routing attacks in the dataset, we leverage Mirai botnet, employed frequently to target IoT devices. The results show that the proposed intrusion detection system can detect 6 attack types with high recall scores ranging from 79% to 100%. We also illustrate the practicality of the developed model via deployment in a proof of concept implementation over a testbed.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Per Packet Flow Anonymization in 6LoWPAN IoT Networks
    Kouachi, Asma Iman
    Sahraoui, Somia
    Bachir, Abdelmalik
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 180 - 186
  • [22] 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
    Le, Anhtuan
    Loo, Jonathan
    Lasebae, Aboubaker
    Aiash, Mahdi
    Luo, Yuan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) : 1189 - 1212
  • [23] Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
    Napiah, Mohamad Nazrin
    Bin Idris, Mohd Yamani Idna
    Ramli, Roziana
    Ahmedy, Ismail
    IEEE ACCESS, 2018, 6 : 16623 - 16638
  • [24] Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN
    Tom, Rijo Jackson
    Sankaranarayanan, Suresh
    de Albuquerque, Victor Hugo C.
    Rodrigues, Joel J. P. C.
    CHINA COMMUNICATIONS, 2020, 17 (01) : 104 - 117
  • [25] Denial-of-Service detection in 6LoWPAN based Internet of Things
    Kasinathan, Prabhakaran
    Pastrone, Claudio
    Spirito, Maurizio A.
    Vinkovits, Mark
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 600 - 607
  • [26] Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN
    Rijo Jackson Tom
    Suresh Sankaranarayanan
    Victor Hugo C.de Albuquerque
    Joel J.P.C.Rodrigues
    中国通信, 2020, 17 (01) : 104 - 117
  • [27] Blackhole Detection in 6LoWPAN Based Internet of Things : An Anomaly Based Approach
    Patel, Himanshu B.
    Jinwala, Devesh C.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 947 - 954
  • [28] Efficient 6LoWPAN Neighbor Discovery Applied to Multilink IoT Subnets
    Watteyne, Thomas
    Thubert, Pascal
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 642 - 647
  • [29] Attack Model and Detection Scheme for Botnet on 6LoWPAN
    Cho, Eung Jun
    Kim, Jin Ho
    Hong, Choong Seon
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 515 - 518
  • [30] IoT Architecture Design for 6LoWPAN Enabled Federated Sensor Network
    Xu, Ran
    Yang, Shuang-Hua
    Li, Ping
    Cao, Jiangtao
    2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 2997 - 3002