Efficient time-delay attack detection based on node pruning and model fusion in IoT networks

被引:0
|
作者
Wenjie Zhao
Yu Wang
Wenbin Zhai
Liang Liu
Yulei Liu
机构
[1] Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology
[2] The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology,undefined
关键词
IoT network; Malicious node detection; Time-delay attack; Model fusion;
D O I
暂无
中图分类号
学科分类号
摘要
IoT devices are vulnerable to various attacks because they are resource-limited. This paper introduces a novel type of attack called time-delay attack. The malicious nodes delay packet forwarding by extending the processing time of packets, thus affecting the performance and availability of the network. This attack is very stealthy and difficult to detect because it does not violate any communication protocol. To the best of our knowledge, how to detect the time-delay attack in IoT networks is still an open problem. We first propose a machine learning-based baseline algorithm to detect the time-delay attack. It models the system features of each node and the forwarding time of packets to detect whether a node is malicious or not. However, the baseline algorithm needs to detect all nodes in the network, which causes unnecessary resource consumption. Moreover, using a single model in the baseline algorithm does not have high robustness. To reduce the overhead and improve the detection performance, we design an efficient Detection algorithm based on Node pruning and Model fusion (DNM). DNM uses node pruning to filter out suspected nodes from all nodes. The suspected nodes are then detected according to a fusion model. We conduct experimental evaluations based on the Cooja network simulator. The experimental results show that baseline and DNM possess close to 90% accuracy, and DNM significantly outperforms other algorithms with an average F1-score of 0.85.
引用
收藏
页码:1286 / 1309
页数:23
相关论文
共 50 条
  • [1] Efficient time-delay attack detection based on node pruning and model fusion in IoT networks
    Zhao, Wenjie
    Wang, Yu
    Zhai, Wenbin
    Liu, Liang
    Liu, Yulei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 1286 - 1309
  • [2] A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks
    Moradi, Mohsen
    Jahangir, Amir Hossein
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2024, 9 (04) : 407 - 423
  • [3] Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks
    Ding, Weichen
    Zhai, Wenbin
    Liu, Liang
    Gu, Ying
    Gao, Hang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [4] ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks
    Zhai, Wenbin
    Liu, Liang
    Ding, Youwei
    Sun, Shanshan
    Gu, Ying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2913 - 2928
  • [5] Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
    Saiyedand, Makhduma F.
    Al-Anbagi, Irfan
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 596 - 616
  • [6] Voice Activity Detection Based on Time-Delay Neural Networks
    Bai, Ye
    Yi, Jiangyan
    Tao, Jianhua
    Wen, Zhengqi
    Liu, Bin
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1173 - 1178
  • [7] A Neural Networks Pruning and Data Fusion Based Intrusion Detection Model
    Wei, Gong
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1772 - 1775
  • [8] Efficient and Intelligent Attack Detection in Software Defined IoT Networks
    Zhang, Yuntong
    Xu, Jingye
    Wang, Zhiwei
    Geng, Rong
    Choo, Kim-Kwang Raymond
    Arturo Perez-Diaz, Jesus
    Zhu, Dakai
    2020 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2020,
  • [9] Runtime Detection of Time-Delay Security Attack in System-on-Chip
    Rajan, Manju
    Choksey, Mayank
    Jose, John
    2022 15TH IEEE/ACM INTERNATIONAL WORKSHOP ON NETWORK ON CHIP ARCHITECTURES (NOCARC 2022), 2022, : 15 - 20
  • [10] Runtime Detection of Time-Delay Security Attack in System-An-Chip
    Rajan, Manju
    Choksey, Mayank
    Jose, John
    2022 15th International Workshop on Network on Chip Architectures, NoCArc 2022 - In conjunction with the 55th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2022, 2022,