Skip to main content
Erschienen in: The Journal of Supercomputing 10/2018

19.05.2018

NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks

verfasst von: Amjad Mehmood, Mithun Mukherjee, Syed Hassan Ahmed, Houbing Song, Khalid Mahmood Malik

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) makes physical objects and devices interact with each other through wireless technologies. IoT is expected to deliver a significant role in our lives in near future. However, at the current stage, IoT is vulnerable to various kinds of security threats just like other wired and wireless networks. Our work mainly focuses on protecting an IoT infrastructure from distributed denial-of-service attacks generated by the intruders. We present a new approach of using Naïve Bayes classification algorithm applied in intrusion detection systems (IDSs). IDSs are deployed in the form of multi-agents throughout the network to sense the misbehaving or irregular traffic and actions of nodes. In the paper, we also discuss the fundamental concepts related to our work and recent research done in similar area.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Miraz MH, Ali M, Excell PS et al (2017) A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). arXiv preprint arXiv Miraz MH, Ali M, Excell PS et al (2017) A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). arXiv preprint arXiv
2.
Zurück zum Zitat Kumar JS, Patel DR (2014) A survey on Internet of Things: security and privacy issues. Int J Comput Appl 90(11):20–26 Kumar JS, Patel DR (2014) A survey on Internet of Things: security and privacy issues. Int J Comput Appl 90(11):20–26
3.
Zurück zum Zitat Farooq MU et al (2015) A review on Internet of Things (IoT). Int J Comput Appl 113(1):1–7MathSciNet Farooq MU et al (2015) A review on Internet of Things (IoT). Int J Comput Appl 113(1):1–7MathSciNet
4.
Zurück zum Zitat Said O (2013) Development of an innovative Internet of Things security system. Int J Comput Sci Issues (IJCSI) 10(6):155–161 Said O (2013) Development of an innovative Internet of Things security system. Int J Comput Sci Issues (IJCSI) 10(6):155–161
5.
Zurück zum Zitat Wang S, Wan J, Li D, Zhang C (2016) Implementing smart factory of industrie 4.0: an outlook. Int J Distrib Sens Netw 12(1):3159805CrossRef Wang S, Wan J, Li D, Zhang C (2016) Implementing smart factory of industrie 4.0: an outlook. Int J Distrib Sens Netw 12(1):3159805CrossRef
6.
Zurück zum Zitat Mansor MN, Muna NU, Muhammad AS (2015) The potential of radio frequency identification (RFID) technology implementation in Malaysian Shipbuilding Industry. J Transp Syst Eng 2:31–36 Mansor MN, Muna NU, Muhammad AS (2015) The potential of radio frequency identification (RFID) technology implementation in Malaysian Shipbuilding Industry. J Transp Syst Eng 2:31–36
7.
Zurück zum Zitat Coskun V, Ozdenizci B, Ok K (2013) A survey on near field communication (NFC) technology. Wireless Pers Commun 71(3):2259–2294CrossRef Coskun V, Ozdenizci B, Ok K (2013) A survey on near field communication (NFC) technology. Wireless Pers Commun 71(3):2259–2294CrossRef
8.
Zurück zum Zitat Gao B et al (2015) On the overhead reduction of millimeter-wave beamforming training in wireless M2M network via multidevice multipath simultaneous training. Int J Distrib Sens Netw 1328–1333 Gao B et al (2015) On the overhead reduction of millimeter-wave beamforming training in wireless M2M network via multidevice multipath simultaneous training. Int J Distrib Sens Netw 1328–1333
9.
Zurück zum Zitat Kuang LW, Mei-Tso L, Yu-Hsuan Y (2015) A machine learning system for routing decision-making in urban vehicular ad hoc networks. Int J Distrib Sens Netw 11:374391CrossRef Kuang LW, Mei-Tso L, Yu-Hsuan Y (2015) A machine learning system for routing decision-making in urban vehicular ad hoc networks. Int J Distrib Sens Netw 11:374391CrossRef
10.
Zurück zum Zitat Ploennigs J, Ryssel U, Kabitzsch K (2010) Performance analysis of the EnOcean wireless sensor network protocol. In: 2010 IEEE Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Ploennigs J, Ryssel U, Kabitzsch K (2010) Performance analysis of the EnOcean wireless sensor network protocol. In: 2010 IEEE Conference on Emerging Technologies and Factory Automation (ETFA). IEEE
11.
Zurück zum Zitat Aman W (2016) Assessing the feasibility of adaptive security models for the Internet of Things. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, pp 201–211 Aman W (2016) Assessing the feasibility of adaptive security models for the Internet of Things. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, pp 201–211
12.
Zurück zum Zitat Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A et al (2011) Internet of things strategic research roadmap. Internet Things Glob Technol Soc Trends 1:9–52 Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A et al (2011) Internet of things strategic research roadmap. Internet Things Glob Technol Soc Trends 1:9–52
13.
Zurück zum Zitat Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (5694) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688CrossRef Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (5694) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688CrossRef
14.
Zurück zum Zitat Khan R et al (2012) Future internet: the Internet of Things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology (FIT). IEEE Khan R et al (2012) Future internet: the Internet of Things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology (FIT). IEEE
15.
Zurück zum Zitat Ullah I, Shah MA, Wahid A, Mehmood A, Song H (2018) ESOT: a new privacy model for preserving location privacy in Internet of Things. Telecommun Syst 67(4):553–575CrossRef Ullah I, Shah MA, Wahid A, Mehmood A, Song H (2018) ESOT: a new privacy model for preserving location privacy in Internet of Things. Telecommun Syst 67(4):553–575CrossRef
16.
Zurück zum Zitat Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:1501.02211 Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:​1501.​02211
17.
Zurück zum Zitat Mehmood A, Lloret J, Sendra S (2016) A secure and low energy zone-based wireless sensor networks routing protocol for pollution monitoring. Wirel Commun Mob Comput 16(17):2869–2883CrossRef Mehmood A, Lloret J, Sendra S (2016) A secure and low energy zone-based wireless sensor networks routing protocol for pollution monitoring. Wirel Commun Mob Comput 16(17):2869–2883CrossRef
18.
Zurück zum Zitat Fremantle P, Scott P (2015) A security survey of middleware for the Internet of Things. PeerJ PrePrints 3:e1521 Fremantle P, Scott P (2015) A security survey of middleware for the Internet of Things. PeerJ PrePrints 3:e1521
19.
Zurück zum Zitat Mehmood A, Nouman M, Umar MM, Song H (2016) ESBL: an energy-efficient scheme by balancing load in group based WSNs. KSII Trans Internet Inf Syst 10(10):1–19 Mehmood A, Nouman M, Umar MM, Song H (2016) ESBL: an energy-efficient scheme by balancing load in group based WSNs. KSII Trans Internet Inf Syst 10(10):1–19
20.
Zurück zum Zitat Jing Q et al (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef Jing Q et al (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef
21.
Zurück zum Zitat Umar MM, Mehmood A, Song H (2016) SeCRoP: secure cluster head centered multihop routing protocol for mobile ad hoc networks. Secur Commun Netw 9(16):3378–3387CrossRef Umar MM, Mehmood A, Song H (2016) SeCRoP: secure cluster head centered multihop routing protocol for mobile ad hoc networks. Secur Commun Netw 9(16):3378–3387CrossRef
22.
Zurück zum Zitat Palmer J (2011) Naïve Bayes classification for intrusion detection using live packet capture. In: Palmer J (ed) Data mining in bioinformatics. Springer, Berlin Palmer J (2011) Naïve Bayes classification for intrusion detection using live packet capture. In: Palmer J (ed) Data mining in bioinformatics. Springer, Berlin
23.
Zurück zum Zitat Mehmood A, Umar MM, Song H (2017) ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw 55:97–106CrossRef Mehmood A, Umar MM, Song H (2017) ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw 55:97–106CrossRef
24.
Zurück zum Zitat Prasad KM, Reddy ARM, Rao KV (2014) DoS and DDoS attacks: defense, detection and traceback mechanisms–a survey. Glob J Comput Sci Technol 14(7):1–19 Prasad KM, Reddy ARM, Rao KV (2014) DoS and DDoS attacks: defense, detection and traceback mechanisms–a survey. Glob J Comput Sci Technol 14(7):1–19
25.
Zurück zum Zitat Zargar ST, Jyoti J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2069CrossRef Zargar ST, Jyoti J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2069CrossRef
26.
Zurück zum Zitat Sonar K, Upadhyay H (2014) A survey: DDOS attack on internet of things. Int J Eng Res Dev 10(11):58–63 Sonar K, Upadhyay H (2014) A survey: DDOS attack on internet of things. Int J Eng Res Dev 10(11):58–63
27.
Zurück zum Zitat Sun B et al (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 14(5):56–63CrossRef Sun B et al (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 14(5):56–63CrossRef
28.
Zurück zum Zitat Liao H-J et al (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24CrossRef Liao H-J et al (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24CrossRef
30.
Zurück zum Zitat Mechtri L, Tolba FD, Ghanemi S (2012) MASID: multi-agent system for intrusion detection in MANET. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE Mechtri L, Tolba FD, Ghanemi S (2012) MASID: multi-agent system for intrusion detection in MANET. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE
31.
Zurück zum Zitat Le A et al (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212CrossRef Le A et al (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212CrossRef
32.
Zurück zum Zitat Marsh D et al (2004) Autonomic wireless sensor networks. Eng Appl Artif Intell 17(7):741–748CrossRef Marsh D et al (2004) Autonomic wireless sensor networks. Eng Appl Artif Intell 17(7):741–748CrossRef
33.
Zurück zum Zitat Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE
35.
Zurück zum Zitat Panda M, Patra MR (2007) Network intrusion detection using Naive Bayes. Int J Comput Sci Netw Secur 7(12):258–263 Panda M, Patra MR (2007) Network intrusion detection using Naive Bayes. Int J Comput Sci Netw Secur 7(12):258–263
36.
Zurück zum Zitat Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674CrossRef Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674CrossRef
37.
Zurück zum Zitat Liu C et al (2011) Research on immunity-based intrusion detection technology for the internet of things. In: 2011 Seventh International Conference on Natural Computation (ICNC), vol 1. IEEE Liu C et al (2011) Research on immunity-based intrusion detection technology for the internet of things. In: 2011 Seventh International Conference on Natural Computation (ICNC), vol 1. IEEE
38.
Zurück zum Zitat Marmol G, Perez M (2010) Providing trust in wireless sensor networks using a bioinspired technique. Telecommun Syst 46(2):163–180CrossRef Marmol G, Perez M (2010) Providing trust in wireless sensor networks using a bioinspired technique. Telecommun Syst 46(2):163–180CrossRef
39.
Zurück zum Zitat Srinivasan A, Teitelbaum J, Wu J (2006) DRBTS: distributed reputation-based beacon trust system. In: Proceedings of 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC’06), pp 277–283 Srinivasan A, Teitelbaum J, Wu J (2006) DRBTS: distributed reputation-based beacon trust system. In: Proceedings of 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC’06), pp 277–283
40.
Zurück zum Zitat Xiang Y, Li K, Zhou W (2011) Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans Inf Forensics Secur 6(2):426–437CrossRef Xiang Y, Li K, Zhou W (2011) Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans Inf Forensics Secur 6(2):426–437CrossRef
Metadaten
Titel
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
verfasst von
Amjad Mehmood
Mithun Mukherjee
Syed Hassan Ahmed
Houbing Song
Khalid Mahmood Malik
Publikationsdatum
19.05.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2413-7

Weitere Artikel der Ausgabe 10/2018

The Journal of Supercomputing 10/2018 Zur Ausgabe