Javascript must be enabled to continue!
MidSiot: A Multistage Intrusion Detection System for Internet of Things
View through CrossRef
Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute‐force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC‐IDS‐2017, and BOT‐IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state‐of‐the‐art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.
Title: MidSiot: A Multistage Intrusion Detection System for Internet of Things
Description:
Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.
0, smart transportation, home automation, and healthcare.
As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet.
This may lead to cybersecurity threats, such as denial of service attacks, brute‐force attacks, and unauthorized accesses.
Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability.
In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats.
In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways.
Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices.
The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices.
The evaluation results on three popular IDS datasets (IoTID20, CIC‐IDS‐2017, and BOT‐IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.
68% and outperforms state‐of‐the‐art IDSs.
This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.
Related Results
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computin...
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
AbstractNowadays, with the proliferation of internet of things-connected devices, the scope of cyber-attacks on the internet of things has grown exponentially. So, it makes it a ne...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
Numerical analysis of the effects of changing hydraulic parameters on saltwater intrusion in coastal aquifers
Numerical analysis of the effects of changing hydraulic parameters on saltwater intrusion in coastal aquifers
PurposeThe purpose of this paper is to develop and validate a numerical model to study the effect of changing hydraulic parameters on saltwater intrusion in coastal aquifers.Design...
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for suc...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...

