Javascript must be enabled to continue!
CEBM: Collaborative Ensemble Blockchain Model for Intrusion Detection in IoT Environment
View through CrossRef
Abstract
In recent years, the IoT environment devices have increased drastically, including smart home devices, ad- hoc networks for the automotive industry ( VANET ), healthcare , smart cities, and apparel. In today’s IoT environment, security is a critical topic due to the type of devices, the nature of the architecture, different communication techniques (primarily wireless), and amount of information shared over the network. Unfortunately, due to this diverse nature of IoT devices it is very difficult to analyze the behavior of intrusion traffic, as it suffers from ability of recognizing new attacks. Another issue is that the poisoning attack during training of model as intruder may inject malicious data as benign during training of model to create a backdoor for intrusion. Moreover, it is very difficult to create a good intrusion detection dataset which contains all kind of traces. Therefore, to protect the network including IoT , from various threats and attacks, Intrusion Detection Systems ( IDSs ) are among the best security methods that can be used. However, an isolated IDS node cannot overcome the problems. Therefore, different IDS need to collaborate in order to improve their performance. Thus, in this paper we propose a generic framework of collaborative ensemble blockchain model ( CEBM ) for intrusion detection in IoT environment. The proposed framework enables the IDS modules to securely share information and build an ensemble detection model by combining the different machine learning models with the best performance using blockchain in a confirmable approach in the absence of a trusted intermediary. UNSW _NB15 dataset is used to evaluate the proposed framework, and five different IDS modules are trained. The performance achieved by the collaborative ensemble model is presented in the form of accuracy, recall, precision, and F-score given as 99.113 %, 99.177 %, 99.559 %, and 0.9942, respectively.
Springer Science and Business Media LLC
Title: CEBM: Collaborative Ensemble Blockchain Model for Intrusion Detection in IoT Environment
Description:
Abstract
In recent years, the IoT environment devices have increased drastically, including smart home devices, ad- hoc networks for the automotive industry ( VANET ), healthcare , smart cities, and apparel.
In today’s IoT environment, security is a critical topic due to the type of devices, the nature of the architecture, different communication techniques (primarily wireless), and amount of information shared over the network.
Unfortunately, due to this diverse nature of IoT devices it is very difficult to analyze the behavior of intrusion traffic, as it suffers from ability of recognizing new attacks.
Another issue is that the poisoning attack during training of model as intruder may inject malicious data as benign during training of model to create a backdoor for intrusion.
Moreover, it is very difficult to create a good intrusion detection dataset which contains all kind of traces.
Therefore, to protect the network including IoT , from various threats and attacks, Intrusion Detection Systems ( IDSs ) are among the best security methods that can be used.
However, an isolated IDS node cannot overcome the problems.
Therefore, different IDS need to collaborate in order to improve their performance.
Thus, in this paper we propose a generic framework of collaborative ensemble blockchain model ( CEBM ) for intrusion detection in IoT environment.
The proposed framework enables the IDS modules to securely share information and build an ensemble detection model by combining the different machine learning models with the best performance using blockchain in a confirmable approach in the absence of a trusted intermediary.
UNSW _NB15 dataset is used to evaluate the proposed framework, and five different IDS modules are trained.
The performance achieved by the collaborative ensemble model is presented in the form of accuracy, recall, precision, and F-score given as 99.
113 %, 99.
177 %, 99.
559 %, and 0.
9942, respectively.
Related Results
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As ...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for suc...
Streamlining IoT-driven Data Using Blockchain
Streamlining IoT-driven Data Using Blockchain
The integration of Internet of Things (IoT) technology has revolutionized data collection and analytics, creating vast networks of interconnected devices generating large volumes o...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...

