Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Clustering model for the first line of defense in IDS for IoT

View through CrossRef
The Internet of Things (IoT) applications are prone to security attacks due to their distributed nature. Intrusion detection systems are the prominent security devices used to protect IoT devices in the network. There have been various kinds of intrusion detection systems designed especially for IoT networks. Still, each faces some challenges like high false rate, failure to detect unknown threats, failure to provide accurate results in real-time monitoring, etc. IoT networks generate huge amounts of data with varying traffic having noise and it is not always possible to label them as normal or malicious. Moreover, traditional signature-based IDS detects only predefined attacks and fails to detect zero-day attacks. In such scenarios, signature-based IDS for IoT are not successful and thus there is a need to use unsupervised learning algorithms of clustering and other machine learning models to detect anomalies in IoT networks. This paper therefore compares various clustering methods and selects the best clustering method that can be used with a machine learning model to enhance the accuracy of the intrusion detection system for IoT networks. The unsupervised clustering algorithm is used for identifying the outliers in IoT device behavior and traffic indicating any security threat. The machine learning algorithms with clustering algorithms help in the detection of known and unknown threats using behavior profiling and clustering techniques. This research evaluates three clustering techniques DBSCAN, K-Means, and Agglomerative Clustering in the context of IoT IDS. It uses metrics such as accuracy, precision, recall, and false positive rate. Experimental results show that DBSCAN clustering proves to be beneficial in detecting threats, reduces false rates, and helps in real-time IoT threat detection when compared to other clustering algorithms methods. These findings lay the importance of DBSCAN-based clustering in IDS helps to enhance security in complex IoT networks. This outcome shall be used to come up with a real-time hybrid model to enhance the precision of IDS in IoT networks.
Title: Clustering model for the first line of defense in IDS for IoT
Description:
The Internet of Things (IoT) applications are prone to security attacks due to their distributed nature.
Intrusion detection systems are the prominent security devices used to protect IoT devices in the network.
There have been various kinds of intrusion detection systems designed especially for IoT networks.
Still, each faces some challenges like high false rate, failure to detect unknown threats, failure to provide accurate results in real-time monitoring, etc.
IoT networks generate huge amounts of data with varying traffic having noise and it is not always possible to label them as normal or malicious.
Moreover, traditional signature-based IDS detects only predefined attacks and fails to detect zero-day attacks.
In such scenarios, signature-based IDS for IoT are not successful and thus there is a need to use unsupervised learning algorithms of clustering and other machine learning models to detect anomalies in IoT networks.
This paper therefore compares various clustering methods and selects the best clustering method that can be used with a machine learning model to enhance the accuracy of the intrusion detection system for IoT networks.
The unsupervised clustering algorithm is used for identifying the outliers in IoT device behavior and traffic indicating any security threat.
The machine learning algorithms with clustering algorithms help in the detection of known and unknown threats using behavior profiling and clustering techniques.
This research evaluates three clustering techniques DBSCAN, K-Means, and Agglomerative Clustering in the context of IoT IDS.
It uses metrics such as accuracy, precision, recall, and false positive rate.
Experimental results show that DBSCAN clustering proves to be beneficial in detecting threats, reduces false rates, and helps in real-time IoT threat detection when compared to other clustering algorithms methods.
These findings lay the importance of DBSCAN-based clustering in IDS helps to enhance security in complex IoT networks.
This outcome shall be used to come up with a real-time hybrid model to enhance the precision of IDS in IoT networks.

Related Results

Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for...
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As ...
A SURVEY OF INTRUSION DETECTION SYSTEMS IN IOT: MACHINE LEARNING AND FEATURE SELECTION APPROACHES
A SURVEY OF INTRUSION DETECTION SYSTEMS IN IOT: MACHINE LEARNING AND FEATURE SELECTION APPROACHES
The Internet of Things (IoT) enables automation and seamless data flow by connecting billions of devices across multiple industries. However, this networked environment also poses ...
MidSiot: A Multistage Intrusion Detection System for Internet of Things
MidSiot: A Multistage Intrusion Detection System for Internet of Things
Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automati...
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or servic...
The Kernel Rough K-Means Algorithm
The Kernel Rough K-Means Algorithm
Background: Clustering is one of the most important data mining methods. The k-means (c-means ) and its derivative methods are the hotspot in the field of clustering research in re...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

Back to Top