IoT Wireless Intrusion Detection and Network Traffic Analysis

被引:12
|
作者
Ponnusamy, Vasaki [1 ]
Yichiet, Aun [1 ]
Jhanjhi, N. Z. [2 ]
Humayun, Mamoona [3 ]
Almufareh, Maram Fahhad [3 ]
机构
[1] Univ Tunku Abdul Rahman, Kampar 31900, Malaysia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[3] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
来源
关键词
IoT; machine learning; traffic features; IDS; KDD-CUP; NSL-KDD;
D O I
10.32604/csse.2022.018801
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless tech-nology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. How -ever, the number of network attacks in wireless networks that exploit such flex-ibilities in setting and tearing down networks has become very alarming. Perpetrators can launch attacks since there is no first line of defense in an ad hoc network setup besides the standard IEEE802.11 WPA2 authentication. One feasible countermeasure is to deploy intrusion detection systems at the edge of these ad hoc networks (Network-based IDS) or at the node level (Host-based IDS). The challenge here is that there is no readily available benchmark data available for IoT network traffic. Creating this benchmark data is very tedious as IoT can work on multiple platforms and networks, and crafting and labelling such dataset is very labor-intensive. This research aims to study the characteristics of existing datasets available such as KDD-Cup and NSL-KDD, and their suitabil-ity for wireless IDS implementation. We hypothesize that network features are parametrically different depending on the types of network and assigning weight dynamically to these features can potentially improve the subsequent threat clas-sifications. This paper analyses packet and flow features for the data packet cap -tured on a wireless network rather than a wired network. Combining domain heuristcs and early classification results, the paper had identified 19 header fields exclusive to wireless network that contain high information gain to be used as ML features in Wireless IDS.
引用
收藏
页码:865 / 879
页数:15
相关论文
共 50 条
  • [41] Wireless sensor networks for intrusion detection:: Packet traffic modeling
    Demirkol, I
    Alagöz, F
    Deliç, H
    Ersoy, C
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (01) : 22 - 24
  • [42] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492
  • [43] Image-Based Intrusion Detection in Network Traffic
    Golubev, Sergei
    Novikova, Evgenia
    INTELLIGENT DISTRIBUTED COMPUTING XV, IDC 2022, 2023, 1089 : 51 - 60
  • [44] Deep Learning Applications for Intrusion Detection in Network Traffic
    Getman, A. I.
    Rybolovlev, D. A.
    Nikolskaya, A. G.
    PROGRAMMING AND COMPUTER SOFTWARE, 2024, 50 (07) : 493 - 510
  • [45] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [46] Intrusion Detection Using Clustering of Network Traffic Flows
    Bailey, Matthew
    Collins, Connor
    Sinda, Matthew
    Hu, Gongzhu
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 615 - 620
  • [47] Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
    Hodo, Elike
    Bellekens, Xavier
    Hamilton, Andrew
    Dubouilh, Pierre-Louis
    Iorkyase, Ephraim
    Tachtatzis, Christos
    Atkinson, Robert
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [48] Secured IoT with Network Intrusion Detection Traffic Control by Data Routing Protocol in WSN Using Genetic Algorithm
    Manikandan, S.
    Pushpa, P.
    Kumar, S. Sathish
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (03): : 126 - 135
  • [49] TS-IDS: Traffic-aware self-supervised learning for IoT Network Intrusion Detection
    Nguyen, Hoang
    Kashef, Rasha
    KNOWLEDGE-BASED SYSTEMS, 2023, 279
  • [50] GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT
    Altaf, Tanzeela
    Wang, Xu
    Ni, Wei
    Yu, Guangsheng
    Liu, Ren Ping
    Braun, Robin
    ELECTRONICS, 2024, 13 (12)