Access the full text.
Sign up today, get DeepDyve free for 14 days.
Rohan Doshi, Noah Apthorpe, N. Feamster (2018)
Machine Learning DDoS Detection for Consumer Internet of Things Devices2018 IEEE Security and Privacy Workshops (SPW)
Ü. Çavuşoğlu (2019)
A new hybrid approach for intrusion detection using machine learning methodsApplied Intelligence, 49
A. Jesudoss (2014)
A SURVEY ON AUTHENTICATION ATTACKS AND COUNTERMEASURES IN A DISTRIBUTED ENVIRONMENT
M. Shafiq, Zhihong Tian, A. Bashir, Xiaojiang Du, M. Guizani (2021)
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning TechniquesIEEE Internet of Things Journal, 8
Nickolaos Koroniotis, Nour Moustafa, E. Sitnikova, B. Turnbull (2018)
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT DatasetFuture Gener. Comput. Syst., 100
T. Nguyen, Samuel Marchal, Markus Miettinen, H. Fereidooni, N. Asokan, A. Sadeghi (2018)
DÏoT: A Federated Self-learning Anomaly Detection System for IoT2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)
Mohanad Sarhan, S. Layeghy, M. Portmann (2021)
Towards a Standard Feature Set for Network Intrusion Detection System DatasetsMobile Networks and Applications, 27
Hasan Alkahtani, Theyazn Aldhyani (2021)
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things ApplicationsSecur. Commun. Networks, 2021
(2020)
Netflow Datasets. https://staff.itee.uq.edu.au/ marius/NIDS datasets
Tie Qiu, Ning Chen, Keqiu Li, Mohammed Atiquzzaman, Wenbing Zhao (2018)
How Can Heterogeneous Internet of Things Build Our Future: A SurveyIEEE Communications Surveys & Tutorials, 20
C. Tankard (2011)
Advanced Persistent threats and how to monitor and deter themNetw. Secur., 2011
(2020)
A discussion on contextawareness to better support the iot
(2017)
DDoS in the IoT
Vivek Christopher, Tharmasanthiran Aathman, Kayathiri Mahendrakumaran, Rashmika Nawaratne, Daswin Silva, V. Nanayakkara, D. Alahakoon (2021)
Minority Resampling Boosted Unsupervised Learning With Hyperdimensional Computing for Threat Detection at the Edge of Internet of ThingsIEEE Access, 9
Aishah ALFRHAN, Reem ALHUSAIN, Rehan Khan (2020)
SMOTE: Class Imbalance Problem In Intrusion Detection System2020 International Conference on Computing and Information Technology (ICCIT-1441)
(2022)
Azure DDos Protection – 2021 Q3 and Q4 DDos attack trends
(2018)
Machine learning and deep learning methods for cyber security
(2022)
Microsoft fights off another record ddos attack as incidents soar
Swati Paliwal, R. Gupta (2012)
Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic AlgorithmInternational Journal of Computer Applications, 60
Bram Steenwinckel, Dieter Paepe, Sander Hautte, Pieter Heyvaert, Mohamed Bentefrit, Pieter Moens, Anastasia Dimou, B. Bossche, F. Turck, S. Hoecke, F. Ongenae (2021)
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learningFuture Gener. Comput. Syst., 116
Mridula Sharma, H. Elmiligi, F. Gebali (2021)
A Novel Intrusion Detection System for RPL-Based Cyber–Physical SystemsIEEE Canadian Journal of Electrical and Computer Engineering, 44
Guangquan Xu, Yan Cao, Yuanyuan Ren, Xiaohong Li, Zhiyong Feng (2017)
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of ThingsIEEE Access, 5
G. Bartlett, J. Heidemann, C. Papadopoulos (2007)
Understanding passive and active service discovery
Dinh Nguyen, Ming Ding, P. Pathirana, A. Seneviratne, Jun Li, F. Poor (2021)
Federated Learning for Internet of Things: A Comprehensive SurveyIEEE Communications Surveys & Tutorials, 23
S. Kasongo, Yanxia Sun (2019)
A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection SystemIEEE Access, 7
He Zhang, Xingrui Yu, Peng Ren, Chunbo Luo, Geyong Min (2019)
Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced FrameworkArXiv, abs/1901.07949
Ahmad Almogren (2020)
Intrusion detection in Edge-of-Things computingJ. Parallel Distributed Comput., 137
Anton Akusok, Kaj-Mikael Björk, Y. Miché, A. Lendasse (2015)
High-Performance Extreme Learning Machines: A Complete Toolbox for Big Data ApplicationsIEEE Access, 3
Sunny Behal, Krishan Kumar (2017)
Detection of DDoS attacks and flash events using information theory metrics-An empirical investigationComput. Commun., 103
Y. Nikoloudakis, Ioannis Kefaloukos, Stylianos Klados, S. Panagiotakis, E. Pallis, C. Skianis, E. Markakis (2021)
Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN ImplementationSensors (Basel, Switzerland), 21
Omer Sezer, Erdogan Dogdu, A. Ozbayoglu (2018)
Context-Aware Computing, Learning, and Big Data in Internet of Things: A SurveyIEEE Internet of Things Journal, 5
U. Lindqvist, Phillip Porras (1999)
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
Punam Bedi, Neha Gupta, Dr Jindal (2020)
Siam-IDS: Handling class imbalance problem in Intrusion Detection Systems using Siamese Neural NetworkProcedia Computer Science, 171
M. Ferrag, L. Maglaras, S. Moschoyiannis, H. Janicke (2020)
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative studyJ. Inf. Secur. Appl., 50
Julen Kahles, J. Torronen, T. Huuhtanen, Alexander Jung (2019)
Automating Root Cause Analysis via Machine Learning in Agile Software Testing Environments2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)
Gernot Vormayr, T. Zseby, J. Fabini (2017)
Botnet Communication PatternsIEEE Communications Surveys & Tutorials, 19
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, Lanyu Xu (2016)
Edge Computing: Vision and ChallengesIEEE Internet of Things Journal, 3
(2016)
A survey of machine learning methods for cyber security intrusion detection
Markus Ring, Sarah Wunderlich, Deniz Scheuring, D. Landes, A. Hotho (2019)
A Survey of Network-based Intrusion Detection Data SetsComput. Secur., 86
Manuel Martín, B. Carro, A. Sánchez-Esguevillas (2020)
Application of deep reinforcement learning to intrusion detection for supervised problemsExpert Syst. Appl., 141
N. Hoque, M. Bhuyan, R. Baishya, D. Bhattacharyya, J. Kalita (2014)
Network attacks: Taxonomy, tools and systemsJ. Netw. Comput. Appl., 40
Ansam Khraisat, Ammar Alazab (2021)
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challengesCybersecurity, 4
Laura Rueden, S. Mayer, Katharina Beckh, B. Georgiev, Sven Giesselbach, R. Heese, Birgit Kirsch, Julius Pfrommer, Annika Pick, Rajkumar Ramamurthy, Michal Walczak, J. Garcke, C. Bauckhage, Jannis Schuecker (2019)
Informed Machine Learning – A Taxonomy and Survey of Integrating Prior Knowledge into Learning SystemsIEEE Transactions on Knowledge and Data Engineering, 35
M. Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, M. Guizani (2020)
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart cityFuture Gener. Comput. Syst., 107
K. Costa, J. Papa, Celso Lisboa, Roberto Muñoz, V. Albuquerque (2019)
Internet of Things: A survey on machine learning-based intrusion detection approachesComput. Networks, 151
G. Bartlett, J. Heidemann, C. Papadopoulos (2007)
Understanding Passive and Active Service Discovery ( Extended )
(2021)
Root cause analysis, threat interpretation, and network survivability prediction device for heterogeneous networks. India patents, application
Michal Trnka, J. Svacina, T. Cerný, Eunjee Song, Jiman Hong, Miroslav Bures (2020)
Securing Internet of Things Devices Using The Network ContextIEEE Transactions on Industrial Informatics, 16
Zhuoran Zhao, Kamyar Barijough, A. Gerstlauer (2018)
DeepThings: Distributed Adaptive Deep Learning Inference on Resource-Constrained IoT Edge ClustersIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37
D. Chicco, Giuseppe Jurman (2020)
The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluationBMC Genomics, 21
M Sharma, H Elmiligi, F Gebali (2021)
A novel intrusion detection system for rpl-based cyber–physical systemsCan J Electr Comput Eng, 44
S. Zargar, J. Joshi, D. Tipper (2013)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding AttacksIEEE Communications Surveys & Tutorials, 15
M. Ferrag, Othmane Friha, L. Maglaras, H. Janicke, Lei Shu (2021)
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental AnalysisIEEE Access, PP
Traditional AI techniques for offline misuse network intrusion detection have performed well, assuming that the traffic from the datasets is sufficiently large for generalization, balanced, independently and identically distributed—exhibiting homogeneous behavior with little to no context change. However, the rapidly expanding IoT network is an ensemble of proliferating internet-connected devices catering to the growing need for handling highly distributed, heterogeneous, and time-critical workloads that conform to none of the above assumptions. Moreover, the evolving Botnet-based attack vectors exploit the non-standardized and poorly scrutinized architectural vulnerabilities of such devices—leading to compounding threat intensity, rapidly rendering the network defenseless. Furthermore, the memory, processor, and energy resource constraints of the IoT devices necessitate lightweight device-specific intrusion detection policies for effective and updated rule learning in real-time through the edge infrastructures. However, the existing methods proposed to solve such issues are either centralized, data and resource-intensive, context-unaware, or inefficient for online rule learning with smaller and imbalanced data samples. Thus, this paper addresses such issues through a context-aware expert system-based feature subset framework with minimal processing overhead and a decentralized on-device misuse detection scheme for IoT—called HetIoT-NIDS, capable of efficiently inferring over smaller data samples, tolerant to class imbalance, and deployable on the low-memory and low-power edge of IoT devices. Furthermore, HetIoT-NIDS facilitates threat localization within the deployed device, preventing threat progression and intensity compounding. The experiments and analyses of the propounded algorithms and the resulting training times and model sizes prove that the proposed approach is efficient and adaptable to online and offline misuse intrusion detection, especially on smaller data sample sizes.
Applied Intelligence – Springer Journals
Published: Jun 1, 2023
Keywords: Botnet-based attacks; Context-awareness; Expert knowledge correlation; Heterogeneous IoT edge; On-device misuse intrusion detection; Root cause analysis; Threat intensity compounding; Threat localization
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.