Skip to main content
Top
Published in: The Journal of Supercomputing 9/2021

05-03-2021

Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)

Authors: Shashank Gavel, Ajay Singh Raghuvanshi, Sudarshan Tiwari

Published in: The Journal of Supercomputing | Issue 9/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The immense growth in the cyber world has given birth to various types of cybercrimes in the Internet of things (IoT). Cybercrimes have breached the multiple levels of cybersecurity that is one of the major issues in the IoT networks. Due to the rise in IoT applications, both devices and services are prone to security attacks and intrusions. The intrusion breaches the data packet extracted from different nodes deployed in the IoT network. Most of the intrusive attacks are very near variants of previously marked cyberattacks containing many repetitive data and features. And to detect the intrusion, the data packet needs to be analyzed. This article presents a novel scheme, i.e., dual-axis dimensionality reduction, that utilizes Kalman filter and salp swarm algorithm (coded as KF-SSA) for analyzing and minimizing the data packet. The proposed data reduction scheme is utilized with KELM-based multiclass classifier to efficiently detect intrusion in the IoT network (KF-SSA with KELM). The proposed method’s overall results are evaluated using standard intrusion detection datasets, i.e., NSL-KDD, KYOTO 2006+ (2015), CICIDS2017, and CICIDS2018 (AWS). The result from the proposed data reduction technique obtains highly reduced data, i.e., 70.% for NSL-KDD and 86.43% for CICIDS2017. The analyzed result shows high detection accuracy of 99.9% for NSL-KDD and 95.68% for CICIDS2017 with decreased computational time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef
2.
go back to reference Alrawais A, Alhothaily A, Hu C, Cheng X (2017a) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42CrossRef Alrawais A, Alhothaily A, Hu C, Cheng X (2017a) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42CrossRef
3.
go back to reference Alrawais A, Alhothaily A, Hu C, Cheng X (2017b) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42CrossRef Alrawais A, Alhothaily A, Hu C, Cheng X (2017b) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42CrossRef
4.
go back to reference Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef Anastasi G, Conti M, Di Francesco M, Passarella A (2009) Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw 7(3):537–568CrossRef
5.
go back to reference Biswas P, Charitha R, Gavel S, Raghuvanshi AS (2019) Fault detection using hybrid of kf-elm for wireless sensor networks. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp 746–750 Biswas P, Charitha R, Gavel S, Raghuvanshi AS (2019) Fault detection using hybrid of kf-elm for wireless sensor networks. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp 746–750
6.
go back to reference Bouraoui A, Jamoussi S, BenAyed Y (2017) A multi-objective genetic algorithm for simultaneous model and feature selection for support vector machines. Artif Intell Rev 50:261–281CrossRef Bouraoui A, Jamoussi S, BenAyed Y (2017) A multi-objective genetic algorithm for simultaneous model and feature selection for support vector machines. Artif Intell Rev 50:261–281CrossRef
7.
go back to reference Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701CrossRef Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701CrossRef
8.
go back to reference da Costa KA, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157CrossRef da Costa KA, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157CrossRef
10.
go back to reference Dastjerdi AV, Buyya R (2016) Fog computing: helping the internet of things realize its potential. Computer 49(8):112–116CrossRef Dastjerdi AV, Buyya R (2016) Fog computing: helping the internet of things realize its potential. Computer 49(8):112–116CrossRef
11.
go back to reference Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for iot system based on transfer learning algorithm. Clust Comput 22(4):9889–9904CrossRef Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for iot system based on transfer learning algorithm. Clust Comput 22(4):9889–9904CrossRef
12.
go back to reference Deshpande A, Guestrin C, Madden SR, Hellerstein JM, Hong W (2004) Model-driven data acquisition in sensor networks. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30, VLDB Endowment, pp 588–599 Deshpande A, Guestrin C, Madden SR, Hellerstein JM, Hong W (2004) Model-driven data acquisition in sensor networks. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30, VLDB Endowment, pp 588–599
13.
go back to reference Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gen Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gen Comput Syst 82:761–768CrossRef
14.
go back to reference Frahim J, Pignataro C, Apcar J, Morrow M (2015) Securing the internet of things: a proposed framework. Cisco White Paper Frahim J, Pignataro C, Apcar J, Morrow M (2015) Securing the internet of things: a proposed framework. Cisco White Paper
15.
go back to reference Fu H, Vong CM, Wong PK, Yang Z (2016) Fast detection of impact location using kernel extreme learning machine. Neural Comput Appl 27(1):121–130CrossRef Fu H, Vong CM, Wong PK, Yang Z (2016) Fast detection of impact location using kernel extreme learning machine. Neural Comput Appl 27(1):121–130CrossRef
16.
go back to reference Gavel S, Raghuvanshi AS, Tiwari S (2020a) Comparative study of anomaly detection in wireless sensor networks using different kernel functions. In: Advances in VLSI, Communication, and Signal Processing, Springer, pp 81–89 Gavel S, Raghuvanshi AS, Tiwari S (2020a) Comparative study of anomaly detection in wireless sensor networks using different kernel functions. In: Advances in VLSI, Communication, and Signal Processing, Springer, pp 81–89
17.
go back to reference Gavel S, Raghuvanshi AS, Tiwari S (2020b) A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks. Int J Netw Manag, p e2144 Gavel S, Raghuvanshi AS, Tiwari S (2020b) A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks. Int J Netw Manag, p e2144
18.
go back to reference Gavel S, Raghuvanshi AS, Tiwari S (2020c) A novel density estimation based intrusion detection technique with Pearson’s divergence for wireless sensor networks. In: ISA Transactions Gavel S, Raghuvanshi AS, Tiwari S (2020c) A novel density estimation based intrusion detection technique with Pearson’s divergence for wireless sensor networks. In: ISA Transactions
19.
go back to reference Hsieh CJ, Si S, Dhillon IS (2014) Fast prediction for large-scale kernel machines. In: NIPS, Citeseer, pp 3689–3697 Hsieh CJ, Si S, Dhillon IS (2014) Fast prediction for large-scale kernel machines. In: NIPS, Citeseer, pp 3689–3697
20.
go back to reference Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501CrossRef Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1–3):489–501CrossRef
21.
go back to reference Huang GB, Zhou H, Ding X, Zhang R (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B (Cybern) 42(2):513–529CrossRef Huang GB, Zhou H, Ding X, Zhang R (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B (Cybern) 42(2):513–529CrossRef
22.
go back to reference Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. IJ Netw Secur 18(6):1089–1101 Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. IJ Netw Secur 18(6):1089–1101
23.
go back to reference Jamei M, Stewart E, Peisert S, Scaglione A, McParland C, Roberts C, McEachern A (2016) Micro synchrophasor-based intrusion detection in automated distribution systems: toward critical infrastructure security. IEEE Internet Comput 20(5):18–27CrossRef Jamei M, Stewart E, Peisert S, Scaglione A, McParland C, Roberts C, McEachern A (2016) Micro synchrophasor-based intrusion detection in automated distribution systems: toward critical infrastructure security. IEEE Internet Comput 20(5):18–27CrossRef
24.
go back to reference Joachims T, Yu CNJ (2009) Sparse kernel svms via cutting-plane training. Mach Learn 76(2):179–193CrossRef Joachims T, Yu CNJ (2009) Sparse kernel svms via cutting-plane training. Mach Learn 76(2):179–193CrossRef
25.
go back to reference Kashef S, Nezamabadi-pour H (2015) An advanced aco algorithm for feature subset selection. Neurocomputing 147:271–279CrossRef Kashef S, Nezamabadi-pour H (2015) An advanced aco algorithm for feature subset selection. Neurocomputing 147:271–279CrossRef
26.
go back to reference Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. In: 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), IEEE, pp 313–316 Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. In: 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), IEEE, pp 313–316
27.
go back to reference Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2016) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):184–208CrossRef Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2016) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):184–208CrossRef
28.
go back to reference Li W, Tug S, Meng W, Wang Y (2019) Designing collaborative blockchained signature-based intrusion detection in iot environments. Future Gen Comput Syst 96:481–489CrossRef Li W, Tug S, Meng W, Wang Y (2019) Designing collaborative blockchained signature-based intrusion detection in iot environments. Future Gen Comput Syst 96:481–489CrossRef
29.
go back to reference Luo J, Vong CM, Wong PK (2014) Sparse Bayesian extreme learning machine for multi-classification. IEEE Trans Neural Netw Learn Syst 25(4):836–843CrossRef Luo J, Vong CM, Wong PK (2014) Sparse Bayesian extreme learning machine for multi-classification. IEEE Trans Neural Netw Learn Syst 25(4):836–843CrossRef
30.
go back to reference Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191CrossRef Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191CrossRef
31.
go back to reference Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820CrossRef Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820CrossRef
32.
go back to reference Mohammadi FG, Abadeh MS (2014) Image steganalysis using a bee colony based feature selection algorithm. Eng Appl Artif Intell 31:35–43CrossRef Mohammadi FG, Abadeh MS (2014) Image steganalysis using a bee colony based feature selection algorithm. Eng Appl Artif Intell 31:35–43CrossRef
33.
go back to reference Moradi P, Gholampour M (2016) A hybrid particle swarm optimization for feature subset selection by integrating a novel local search strategy. Appl Soft Comput 43:117–130CrossRef Moradi P, Gholampour M (2016) A hybrid particle swarm optimization for feature subset selection by integrating a novel local search strategy. Appl Soft Comput 43:117–130CrossRef
34.
go back to reference Musolesi M, Hailes S, Mascolo C (2005) Adaptive routing for intermittently connected mobile ad hoc networks. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, IEEE, pp 183–189 Musolesi M, Hailes S, Mascolo C (2005) Adaptive routing for intermittently connected mobile ad hoc networks. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, IEEE, pp 183–189
35.
go back to reference Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput Netw 53(12):2022–2037CrossRef Ozdemir S, Xiao Y (2009) Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput Netw 53(12):2022–2037CrossRef
36.
go back to reference Panigrahi R, Borah S (2018) A detailed analysis of cicids2017 dataset for designing intrusion detection systems. Int J Eng Technol 7(3.24):479–482 Panigrahi R, Borah S (2018) A detailed analysis of cicids2017 dataset for designing intrusion detection systems. Int J Eng Technol 7(3.24):479–482
37.
go back to reference Pásztor B, Musolesi M, Mascolo C (2007) Opportunistic mobile sensor data collection with scar. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, IEEE, pp 1–12 Pásztor B, Musolesi M, Mascolo C (2007) Opportunistic mobile sensor data collection with scar. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, IEEE, pp 1–12
38.
go back to reference Ramos CC, Souza AN, Chiachia G, Falcao AX, Papa JP (2011) A novel algorithm for feature selection using harmony search and its application for non-technical losses detection. Comput Electr Eng 37(6):886–894CrossRef Ramos CC, Souza AN, Chiachia G, Falcao AX, Papa JP (2011) A novel algorithm for feature selection using harmony search and its application for non-technical losses detection. Comput Electr Eng 37(6):886–894CrossRef
39.
go back to reference Raza S, Wallgren L, Voigt T (2013) Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674CrossRef Raza S, Wallgren L, Voigt T (2013) Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674CrossRef
40.
go back to reference Rodrigues D, Pereira LA, Nakamura RY, Costa KA, Yang XS, Souza AN, Papa JP (2014) A wrapper approach for feature selection based on bat algorithm and optimum-path forest. Expert Syste Appl 41(5):2250–2258CrossRef Rodrigues D, Pereira LA, Nakamura RY, Costa KA, Yang XS, Souza AN, Papa JP (2014) A wrapper approach for feature selection based on bat algorithm and optimum-path forest. Expert Syste Appl 41(5):2250–2258CrossRef
41.
go back to reference Sarafrazi S, Nezamabadi-pour H (2013) Facing the classification of binary problems with a gsa-svm hybrid system. Math Comput Modell 57(1–2):270–278MathSciNetCrossRef Sarafrazi S, Nezamabadi-pour H (2013) Facing the classification of binary problems with a gsa-svm hybrid system. Math Comput Modell 57(1–2):270–278MathSciNetCrossRef
44.
go back to reference Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8 Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8
45.
go back to reference Vaidyanathan K, Sur S, Narravula S, Sinha P (2004) Data aggregation techniques in sensor networks. Osu-cisrc-11/04-tr60, The Ohio State University Vaidyanathan K, Sur S, Narravula S, Sinha P (2004) Data aggregation techniques in sensor networks. Osu-cisrc-11/04-tr60, The Ohio State University
46.
go back to reference Wei G, Ling Y, Guo B, Xiao B, Vasilakos AV (2011) Prediction-based data aggregation in wireless sensor networks: combining grey model and Kalman filter. Comput Commun 34(6):793–802CrossRef Wei G, Ling Y, Guo B, Xiao B, Vasilakos AV (2011) Prediction-based data aggregation in wireless sensor networks: combining grey model and Kalman filter. Comput Commun 34(6):793–802CrossRef
47.
go back to reference Wu S, Wang Y, Cheng S (2013) Extreme learning machine based wind speed estimation and sensorless control for wind turbine power generation system. Neurocomputing 102:163–175CrossRef Wu S, Wang Y, Cheng S (2013) Extreme learning machine based wind speed estimation and sensorless control for wind turbine power generation system. Neurocomputing 102:163–175CrossRef
48.
go back to reference Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey. In: International Conference on Wireless Algorithms, Systems, and Applications, Springer, pp 685–695 Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey. In: International Conference on Wireless Algorithms, Systems, and Applications, Springer, pp 685–695
Metadata
Title
Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)
Authors
Shashank Gavel
Ajay Singh Raghuvanshi
Sudarshan Tiwari
Publication date
05-03-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 9/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-03697-5

Other articles of this Issue 9/2021

The Journal of Supercomputing 9/2021 Go to the issue

Premium Partner