IoT Wireless Intrusion Detection and Network Traffic Analysis

被引:12
|
作者
Ponnusamy, Vasaki [1 ]
Yichiet, Aun [1 ]
Jhanjhi, N. Z. [2 ]
Humayun, Mamoona [3 ]
Almufareh, Maram Fahhad [3 ]
机构
[1] Univ Tunku Abdul Rahman, Kampar 31900, Malaysia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
来源
关键词
IoT; machine learning; traffic features; IDS; KDD-CUP; NSL-KDD;
D O I
10.32604/csse.2022.018801
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless tech-nology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. How -ever, the number of network attacks in wireless networks that exploit such flex-ibilities in setting and tearing down networks has become very alarming. Perpetrators can launch attacks since there is no first line of defense in an ad hoc network setup besides the standard IEEE802.11 WPA2 authentication. One feasible countermeasure is to deploy intrusion detection systems at the edge of these ad hoc networks (Network-based IDS) or at the node level (Host-based IDS). The challenge here is that there is no readily available benchmark data available for IoT network traffic. Creating this benchmark data is very tedious as IoT can work on multiple platforms and networks, and crafting and labelling such dataset is very labor-intensive. This research aims to study the characteristics of existing datasets available such as KDD-Cup and NSL-KDD, and their suitabil-ity for wireless IDS implementation. We hypothesize that network features are parametrically different depending on the types of network and assigning weight dynamically to these features can potentially improve the subsequent threat clas-sifications. This paper analyses packet and flow features for the data packet cap -tured on a wireless network rather than a wired network. Combining domain heuristcs and early classification results, the paper had identified 19 header fields exclusive to wireless network that contain high information gain to be used as ML features in Wireless IDS.
引用
收藏
页码:865 / 879
页数:15
相关论文
共 50 条
  • [21] Intrusion Detection System for IoT Heterogeneous Perceptual Network
    Zhou, Man
    Han, Lansheng
    Lu, Hongwei
    Fu, Cai
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1461 - 1474
  • [22] Intrusion Detection System for IoT Heterogeneous Perceptual Network
    Man Zhou
    Lansheng Han
    Hongwei Lu
    Cai Fu
    Mobile Networks and Applications, 2021, 26 : 1461 - 1474
  • [23] Joint Semantic Transfer Network for IoT Intrusion Detection
    Wu, Jiashu
    Wang, Yang
    Xie, Binhui
    Li, Shuang
    Dai, Hao
    Ye, Kejiang
    Xu, Chengzhong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3368 - 3383
  • [24] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [25] A Hybrid Classification Approach for Intrusion Detection in IoT Network
    Choudhary, Sarika
    Kesswani, Nishtha
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (09): : 809 - 816
  • [26] Open Set Dandelion Network for IoT Intrusion Detection
    Wu, Jiashu
    Dai, Hao
    Kent, Kenneth B.
    Yen, Jerome
    Xu, Chengzhong
    Wang, Yang
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2024, 24 (01)
  • [27] Exploring edge TPU for network intrusion detection in IoT
    Hosseininoorbin, Seyedehfaezeh
    Layeghy, Siamak
    Sarhan, Mohanad
    Jurdak, Raja
    Portmann, Marius
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [28] A clustering approach to wireless network intrusion detection
    Zhong, S
    Khoshgoftaar, TM
    Nath, SV
    ICTAI 2005: 17TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, : 190 - 196
  • [29] A survey of intrusion detection in wireless network applications
    Mitchell, Robert
    Chen, Ing-Ray
    COMPUTER COMMUNICATIONS, 2014, 42 : 1 - 23
  • [30] Building Intrusion Detection with a Wireless Sensor Network
    Waelchli, Markus
    Braun, Torsten
    AD HOC NETWORKS, 2010, 28 : 607 - 622