Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2021

04-01-2021 | Research Article-Computer Engineering and Computer Science

SEM: Stacking Ensemble Meta-Learning for IOT Security Framework

Authors: Debasmita Mishra, Bighnaraj Naik, Pandit Byomakesha Dash, Janmenjoy Nayak

Published in: Arabian Journal for Science and Engineering | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Despite the popularity of the applicability of Internet of Things (IoT) devices in many applications, security and anomaly detection has always been a rising concern for any domain of research. In the current smart era, the increased use of IoT and related applications in almost all domains tune us for the alarming situations of security measures. Many such insecure threats such as the denial of service, malicious control, and operations can be the real harm for any IoT devices. Compared to the initial days of developments in IoT control, many advanced techniques based on machine learning are designed for effective control of such malicious activities. In this paper, a stacked ensemble meta-learning (SEM) model has been developed to enhance the performance of the base machine learning model used for anomaly detection in IoT devices. The proposed model learns from the prediction errors of the base classifiers to build a more accurate prediction model. The proposed SEM constructs a higher-level prediction model over the predictions of weak base classifiers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D.: IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D.: IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef
2.
go back to reference Mahalle, P.N.; Anggorojati, B.; Prasad, N.R.; Prasad, R.: Identity authentication and capability based access control (IACAC) for the Internet of Things. J Cyber Secur. Mobil 1, 309–348 (2013) Mahalle, P.N.; Anggorojati, B.; Prasad, N.R.; Prasad, R.: Identity authentication and capability based access control (IACAC) for the Internet of Things. J Cyber Secur. Mobil 1, 309–348 (2013)
3.
go back to reference Suo, H.; Wan, J.; Zou, C.; Liu, J.: (2012) Security in the internet of things: a review. In: Computer Science and Electronics Engineering (ICCSEE), pp. 648–651 Suo, H.; Wan, J.; Zou, C.; Liu, J.: (2012) Security in the internet of things: a review. In: Computer Science and Electronics Engineering (ICCSEE), pp. 648–651
4.
go back to reference Diro, A.A.; Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gen. Comput. Syst. 82, 761–768 (2018)CrossRef Diro, A.A.; Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gen. Comput. Syst. 82, 761–768 (2018)CrossRef
5.
go back to reference Cui, L.; Yang, S.; Chen, F.; Ming, Z.; Lu, N.; Qin, J.: A survey on application of machine learning for internet of things. Int. J. Mach. Learn. Cybernet. 9(8), 1399–1417 (2018)CrossRef Cui, L.; Yang, S.; Chen, F.; Ming, Z.; Lu, N.; Qin, J.: A survey on application of machine learning for internet of things. Int. J. Mach. Learn. Cybernet. 9(8), 1399–1417 (2018)CrossRef
6.
go back to reference Hasan, M.; Islam, M.M.; Zarif, M.I.I.; Hashem, M.M.A.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7, 100059 (2019)CrossRef Hasan, M.; Islam, M.M.; Zarif, M.I.I.; Hashem, M.M.A.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7, 100059 (2019)CrossRef
7.
go back to reference Kumar, R.; Zhang, X.; Wang, W.; Khan, R.U.; Kumar, J.; Sharif, A.: A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7, 64411–64430 (2019)CrossRef Kumar, R.; Zhang, X.; Wang, W.; Khan, R.U.; Kumar, J.; Sharif, A.: A multimodal malware detection technique for android IoT devices using various features. IEEE Access 7, 64411–64430 (2019)CrossRef
9.
go back to reference Kunugi, Y.; Suzuki, H.; Koyama, A.: IoT security viewer system using machine learning. In: International Conference on Advanced Information Networking and Applications. Springer, Cham (2019). Kunugi, Y.; Suzuki, H.; Koyama, A.: IoT security viewer system using machine learning. In: International Conference on Advanced Information Networking and Applications. Springer, Cham (2019).
10.
go back to reference Punithavathi, P.; et al.: A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484, 255–268 (2019)CrossRef Punithavathi, P.; et al.: A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484, 255–268 (2019)CrossRef
11.
go back to reference Doshi, R.; Apthorpe, N.; Feamster, N.: Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE (2018). Doshi, R.; Apthorpe, N.; Feamster, N.: Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE (2018).
12.
go back to reference Shakeel, P.Mohamed; et al.: Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 42(10), 186 (2018)CrossRef Shakeel, P.Mohamed; et al.: Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 42(10), 186 (2018)CrossRef
13.
go back to reference Kotenko, I.; Saenko, I.; Branitskiy, A.: Framework for mobile internet of things security monitoring based on big data processing and machine learning. IEEE Access 6, 72714–72723 (2018)CrossRef Kotenko, I.; Saenko, I.; Branitskiy, A.: Framework for mobile internet of things security monitoring based on big data processing and machine learning. IEEE Access 6, 72714–72723 (2018)CrossRef
14.
go back to reference Rathore, S.; Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018)CrossRef Rathore, S.; Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018)CrossRef
15.
go back to reference Meidan, Y. et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing. ACM (2017). Meidan, Y. et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing. ACM (2017).
16.
go back to reference Canedo, J.; Anthony S.: Using machine learning to secure IoT systems. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE. (2016) Canedo, J.; Anthony S.: Using machine learning to secure IoT systems. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE. (2016)
17.
go back to reference Ullah, I.; Mahmoud, Q.H.: A two-level flow-based anomalous activity detection system for IoT networks. Electronics 9(3), 530 (2020)CrossRef Ullah, I.; Mahmoud, Q.H.: A two-level flow-based anomalous activity detection system for IoT networks. Electronics 9(3), 530 (2020)CrossRef
19.
go back to reference Alrashdi, I.; Alqazzaz, A.; Aloufi, E.; Alharthi, R.; Zohdy, M.; Ming, H.: Ad-iot: anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0305–0310). IEEE. (2019) Alrashdi, I.; Alqazzaz, A.; Aloufi, E.; Alharthi, R.; Zohdy, M.; Ming, H.: Ad-iot: anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0305–0310). IEEE. (2019)
20.
go back to reference Pajouh, H.H.; Javidan, R.; Khayami, R.; Dehghantanha, A.; Choo, K.-K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)CrossRef Pajouh, H.H.; Javidan, R.; Khayami, R.; Dehghantanha, A.; Choo, K.-K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314–323 (2019)CrossRef
21.
go back to reference Li, H.; Liu, Y.; Qin, Z.; Rong, H.; Liu, Q.: A large-scale urban vehicular network framework for IoT in smart cities. IEEE Access 7, 74437–74449 (2019)CrossRef Li, H.; Liu, Y.; Qin, Z.; Rong, H.; Liu, Q.: A large-scale urban vehicular network framework for IoT in smart cities. IEEE Access 7, 74437–74449 (2019)CrossRef
22.
go back to reference Akter, M.; Dip, G. D.; Mira, M. S.; Hamid, M. A.; Mridha, M. F: Construing attacks of internet of things (IoT) and a prehensile intrusion detection system for anomaly detection using deep learning approach. In: International Conference on Innovative Computing and Communications vol. 2, 2020, pp. 427–438. Akter, M.; Dip, G. D.; Mira, M. S.; Hamid, M. A.; Mridha, M. F: Construing attacks of internet of things (IoT) and a prehensile intrusion detection system for anomaly detection using deep learning approach. In: International Conference on Innovative Computing and Communications vol. 2, 2020, pp. 427–438.
25.
go back to reference Lemaître, G.; Nogueira, F.; Aridas, C.K.: Imbalanced-learn: a python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 18(1), 559–563 (2017) Lemaître, G.; Nogueira, F.; Aridas, C.K.: Imbalanced-learn: a python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 18(1), 559–563 (2017)
26.
go back to reference Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)CrossRef
27.
go back to reference Liu, A.; Ghosh, J.; Martin, C. E.: Generative oversampling for mining imbalanced datasets. In DMIN pp. 66–72 (2007). Liu, A.; Ghosh, J.; Martin, C. E.: Generative oversampling for mining imbalanced datasets. In DMIN pp. 66–72 (2007).
28.
go back to reference Dietterich, T. G.: Ensemble learning. In: The handbook of brain theory and neural networks, vol. 2, pp. 110–125 (2002) Dietterich, T. G.: Ensemble learning. In: The handbook of brain theory and neural networks, vol. 2, pp. 110–125 (2002)
30.
go back to reference Prasatha, V. S.; Alfeilate, H. A. A.; Hassanate, A. B.; Lasassmehe, O.; Tarawnehf, A. S.; Alhasanatg, M. B.; Salmane, H. S. E.: Effects of distance measure choice on KNN classifier performance-a review. arXiv preprint arXiv:1708.04321.(2017) Prasatha, V. S.; Alfeilate, H. A. A.; Hassanate, A. B.; Lasassmehe, O.; Tarawnehf, A. S.; Alhasanatg, M. B.; Salmane, H. S. E.: Effects of distance measure choice on KNN classifier performance-a review. arXiv preprint arXiv:​1708.​04321.(2017)
31.
go back to reference Pahl, M. O.; Aubet, F. X.: All eyes on you: distributed multi-dimensional IoT microservice anomalydetection. In: Proceedings of the 2018 Fourteenth International Conference on Network and Service Management (CNSM)(CNSM 2018), 2018. Rome, Italy. Pahl, M. O.; Aubet, F. X.: All eyes on you: distributed multi-dimensional IoT microservice anomalydetection. In: Proceedings of the 2018 Fourteenth International Conference on Network and Service Management (CNSM)(CNSM 2018), 2018. Rome, Italy.
32.
go back to reference Liu, X.; Liu, Y.; Liu, A.; Yang, L.T.: Defending on–offattacks using light probing messages in smart sensors for industrial communication systems. IEEE Trans. Ind. Inf. 14(9), 3801–3811 (2018)CrossRef Liu, X.; Liu, Y.; Liu, A.; Yang, L.T.: Defending on–offattacks using light probing messages in smart sensors for industrial communication systems. IEEE Trans. Ind. Inf. 14(9), 3801–3811 (2018)CrossRef
34.
go back to reference Friedman, M.: The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 32(200), 675–701 (1937)CrossRef Friedman, M.: The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 32(200), 675–701 (1937)CrossRef
35.
go back to reference Naik, B.; Nayak, J.; Behera, H.S.; Abraham, A.: A self adaptive harmony search based functional link higher order ANN for non-linear data classification. Neurocomputing 179, 69–87 (2016)CrossRef Naik, B.; Nayak, J.; Behera, H.S.; Abraham, A.: A self adaptive harmony search based functional link higher order ANN for non-linear data classification. Neurocomputing 179, 69–87 (2016)CrossRef
Metadata
Title
SEM: Stacking Ensemble Meta-Learning for IOT Security Framework
Authors
Debasmita Mishra
Bighnaraj Naik
Pandit Byomakesha Dash
Janmenjoy Nayak
Publication date
04-01-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2021
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-05187-x

Other articles of this Issue 4/2021

Arabian Journal for Science and Engineering 4/2021 Go to the issue

Research Article-Computer Engineering and Computer Science

Design and Analysis of Pattern Matching Algorithms Based on QuRAM Processing

Research Article-Computer Engineering and Computer Science

A Digital Geometry-Based Fingerprint Matching Technique

Research Article-Computer Engineering and Computer Science

A Novel Area Coverage Technique for Maximizing the Wireless Sensor Network Lifetime

Premium Partners