Skip to main content
Erschienen in: Wireless Personal Communications 3/2020

25.01.2020

SH-IDS: Specification Heuristics Based Intrusion Detection System for IoT Networks

verfasst von: M. Jagadeesh Babu, A. Raji Reddy

Erschienen in: Wireless Personal Communications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The loosely coupled independent hardware of any kind under internet protocol refers to the Internet of Things (IoT). The IoT network has often framed by the composition of various standards, techniques, and services that are having diversified privacy & security prerequisites. Therefore, it has noted that paradigm IoT has similar problems of security as cloud services, the internet, and “mobile communication networks”. Nevertheless, the outdated countermeasures of security, & implementation of privacy cannot be applied directly to the technologies of IoT because of confined IoT elements computing power, the maximum amount of interrelated devices & data sharing among users & objects. The proposals of IDS for the IoT will be placed to be distributed or central system or in the combination of bi-phase systems. The traditional intrusion detection strategies detect intrusion either by signature, anomalies, or a combination of any of these. Due to the limited resources of the devices placed in IoT networks, the intrusion detection strategies should perform the intrusion defense under the constrained resources of the corresponding devices. Regarding this argument, a novel specification measure that allows each of the devices falls in an IoT network to defend the intrusion at a corresponding device level. The method explored in this manuscript is a specification approach that determines Specification Heuristics to assess the scope of intrusion in IoT network requests.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., et al. (2011). Internet of things strategic research roadmap. Internet of Things-Global Technological and Societal Trends,1(2011), 9–52. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., et al. (2011). Internet of things strategic research roadmap. Internet of Things-Global Technological and Societal Trends,1(2011), 9–52.
2.
Zurück zum Zitat Peña-López, I. (2005). ITU Internet report 2005: The internet of things. Peña-López, I. (2005). ITU Internet report 2005: The internet of things.
3.
Zurück zum Zitat Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks,15(76), 146–164.CrossRef Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks,15(76), 146–164.CrossRef
4.
Zurück zum Zitat Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.CrossRef
5.
Zurück zum Zitat Trippel, T., Weisse, O., Xu, W., Honeyman, P., & Fu, K. (2017). WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In 2017 IEEE European symposium on security and privacy (EuroS&P) (pp. 3–18). IEEE. Trippel, T., Weisse, O., Xu, W., Honeyman, P., & Fu, K. (2017). WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In 2017 IEEE European symposium on security and privacy (EuroS&P) (pp. 3–18). IEEE.
6.
Zurück zum Zitat Oh, D., Kim, D., & Ro, W. W. (2014). A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors,14(12), 24188–24211.CrossRef Oh, D., Kim, D., & Ro, W. W. (2014). A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors,14(12), 24188–24211.CrossRef
8.
Zurück zum Zitat Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In IM (pp. 606–611). Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In IM (pp. 606–611).
9.
Zurück zum Zitat Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks,11(8), 2661–2674.CrossRef Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks,11(8), 2661–2674.CrossRef
10.
Zurück zum Zitat Farooqi, A. H., & Khan, F. A. (2009). Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking (pp. 234–241). Berlin : Springer. Farooqi, A. H., & Khan, F. A. (2009). Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking (pp. 234–241). Berlin : Springer.
11.
Zurück zum Zitat Cho, E. J., Kim, J. H., & Hong, C. S. (2009). Attack model and detection scheme for Botnet on 6LoWPAN. In Asia-Pacific network operations and management symposium (pp. 515–518). Berlin: Springer. Cho, E. J., Kim, J. H., & Hong, C. S. (2009). Attack model and detection scheme for Botnet on 6LoWPAN. In Asia-Pacific network operations and management symposium (pp. 515–518). Berlin: Springer.
12.
Zurück zum Zitat Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600–607). IEEE. Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600–607). IEEE.
13.
Zurück zum Zitat Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). An IDS framework for internet of things empowered by 6LoWPAN. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (pp. 1337–1340). ACM. Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). An IDS framework for internet of things empowered by 6LoWPAN. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (pp. 1337–1340). ACM.
14.
Zurück zum Zitat Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks,9(8), 794326.CrossRef Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks,9(8), 794326.CrossRef
15.
Zurück zum Zitat Gelenbe, E., & Yin, Y. (2017). Deep learning with dense random neural networks. In Proceedings of the international conference on man–machine interactions (pp. 3–18). Springer. Gelenbe, E., & Yin, Y. (2017). Deep learning with dense random neural networks. In Proceedings of the international conference on man–machine interactions (pp. 3–18). Springer.
16.
Zurück zum Zitat Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y. M., Augusto-Gonzalez, J., & Ramos, M. (2018). Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In Proceedings of the 2018 ISCIS security workshop, Lecture notes CCIS, in: 821. Imperial College London. Recent Cybersecurity Research in Europe. Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y. M., Augusto-Gonzalez, J., & Ramos, M. (2018). Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In Proceedings of the 2018 ISCIS security workshop, Lecture notes CCIS, in: 821. Imperial College London. Recent Cybersecurity Research in Europe.
17.
Zurück zum Zitat Liu, X., Liu, Y., Liu, A., & Yang, L. T. (2018). Defending on–off attacks using light probing messages in smart sensors for industrial communication systems. IEEE Transactions on Industrial Informatics,14(9), 3801–3811.CrossRef Liu, X., Liu, Y., Liu, A., & Yang, L. T. (2018). Defending on–off attacks using light probing messages in smart sensors for industrial communication systems. IEEE Transactions on Industrial Informatics,14(9), 3801–3811.CrossRef
18.
Zurück zum Zitat Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems,82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems,82, 761–768.CrossRef
19.
Zurück zum Zitat Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: An adaptive intrusion detection for the Internet of Things. Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: An adaptive intrusion detection for the Internet of Things.
20.
Zurück zum Zitat Pajouh, H. H., Javidan, R., Khayami, R., Ali, D., & Choo, K.-K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing,7(2), 314–323.CrossRef Pajouh, H. H., Javidan, R., Khayami, R., Ali, D., & Choo, K.-K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing,7(2), 314–323.CrossRef
21.
Zurück zum Zitat D’Angelo, G., Palmieri, F., Ficco, M., & Rampone, S. (2015). An uncertainty-managing batch relevance-based approach to network anomaly detection. Applied Soft Computing,36, 408–418.CrossRef D’Angelo, G., Palmieri, F., Ficco, M., & Rampone, S. (2015). An uncertainty-managing batch relevance-based approach to network anomaly detection. Applied Soft Computing,36, 408–418.CrossRef
22.
Zurück zum Zitat Kozik, R., Choras´, M., Ficco, M., & Palmieri, F. (2018). A scalable distributed machine learning approach for attack detection in edge computing environments. Journal of Parallel and Distributed Computing,119, 18–26.CrossRef Kozik, R., Choras´, M., Ficco, M., & Palmieri, F. (2018). A scalable distributed machine learning approach for attack detection in edge computing environments. Journal of Parallel and Distributed Computing,119, 18–26.CrossRef
23.
Zurück zum Zitat Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011). Specification-based IDS for securing RPL from topology attacks. In 2011 IFIP wireless days (WD) (pp. 1–3). IEEE. Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011). Specification-based IDS for securing RPL from topology attacks. In 2011 IFIP wireless days (WD) (pp. 1–3). IEEE.
24.
Zurück zum Zitat Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 1796–1801). IEEE. Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE international conference on communications (ICC) (pp. 1796–1801). IEEE.
25.
Zurück zum Zitat Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Applications,121(9), 1–9.CrossRef Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Applications,121(9), 1–9.CrossRef
26.
Zurück zum Zitat Thanigaivelan, N. K., Nigussie, E., Kanth, R. K., Virtanen, S., & Isoaho, J. (2016). Distributed internal anomaly detection system for Internet-of-Things. In 2016 13th IEEE annual consumer communications & networking conference (CCNC) (pp. 319–320). IEEE. Thanigaivelan, N. K., Nigussie, E., Kanth, R. K., Virtanen, S., & Isoaho, J. (2016). Distributed internal anomaly detection system for Internet-of-Things. In 2016 13th IEEE annual consumer communications & networking conference (CCNC) (pp. 319–320). IEEE.
27.
Zurück zum Zitat Vacca, J. R. (2012). Computer and information security handbook. Newnes: Elsevier. Vacca, J. R. (2012). Computer and information security handbook. Newnes: Elsevier.
28.
Zurück zum Zitat Liao, H. J., Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications,36(1), 16–24.CrossRef Liao, H. J., Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications,36(1), 16–24.CrossRef
29.
Zurück zum Zitat Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR),46(4), 55.CrossRef Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR),46(4), 55.CrossRef
30.
Zurück zum Zitat Summerville, D. H., Zach, K. M., & Chen, Y. (2015). Ultra-lightweight deep packet anomaly detection for Internet of Things devices. In 2015 IEEE 34th international performance computing and communications conference (IPCCC) (pp. 1–8). IEEE. Summerville, D. H., Zach, K. M., & Chen, Y. (2015). Ultra-lightweight deep packet anomaly detection for Internet of Things devices. In 2015 IEEE 34th international performance computing and communications conference (IPCCC) (pp. 1–8). IEEE.
31.
Zurück zum Zitat Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,16(1), 266–282.CrossRef
32.
Zurück zum Zitat Le, A., Loo, J., Chai, K. K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information,7(2), 25.CrossRef Le, A., Loo, J., Chai, K. K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information,7(2), 25.CrossRef
35.
Zurück zum Zitat Moustafa, N., & Slay, J. (2015). Unsw-nb15: A comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In Military communications and information systems conference (MilCIS) (pp. 1–6). IEEE. Moustafa, N., & Slay, J. (2015). Unsw-nb15: A comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In Military communications and information systems conference (MilCIS) (pp. 1–6). IEEE.
39.
Zurück zum Zitat Siddesh, G. K., Muralidhara, K. N., & Harihar, M. N. (2011). Routing in ad hoc wireless networks using soft computing techniques and performance evaluation using hypernet simulator. International Journal of Soft Computing and Engineering,1(3), 91–97. Siddesh, G. K., Muralidhara, K. N., & Harihar, M. N. (2011). Routing in ad hoc wireless networks using soft computing techniques and performance evaluation using hypernet simulator. International Journal of Soft Computing and Engineering,1(3), 91–97.
Metadaten
Titel
SH-IDS: Specification Heuristics Based Intrusion Detection System for IoT Networks
verfasst von
M. Jagadeesh Babu
A. Raji Reddy
Publikationsdatum
25.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07137-0

Weitere Artikel der Ausgabe 3/2020

Wireless Personal Communications 3/2020 Zur Ausgabe

Neuer Inhalt