Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)

Published: 03 March 2021 Publication History

Abstract

The participation of ordinary devices in networking has created a world of connected devices rapidly. The Internet of Things (IoT) includes heterogeneous devices from every field. There are no definite protocols or standards for IoT communication, and most of the IoT devices have limited resources. Enabling a complete security measure for such devices is a challenging task, yet necessary. Many lightweight security solutions have surfaced lately for IoT. The lightweight security protocols are unable to provide an optimum protection against prevailing powerful threats in cyber world. It is also hard to deploy any traditional security protocol on resource‐constrained IoT devices. Software‐defined networking introduces a centralized control in computer networks. SDN has a programmable approach towards networking that decouples control and data planes. An SDN‐based intrusion detection system is proposed which uses deep learning classifier for detection of anomalies in IoT. The proposed intrusion detection system does not burden the IoT devices with security profiles. The proposed work is executed on the simulated environment. The results of the simulation test are evaluated using various matrices and compared with other relevant methods.

References

[1]
Li, S., Da Xu, L., Zhao, S.: 5G Internet of Things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018)
[2]
Russell, B., Van Duren, D.: Practical Internet of Things Security., Packt Publishing (2016). https://www.oreilly.com/library/view/practical-internet-of/9781785889639/
[3]
Liu, L., et al.: An intrusion detection method for internet of things based on suppressed fuzzy clustering: EURASIP J. on Wirel Comm. and Netw. 2018(1), (2018). https://doi.org/10.1186/s13638-018-1128-z
[4]
Qushtom, H.: Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS. Int J Comput Netw Infor Secur. 9(11), 27–35 (2017)
[5]
Khan, Z.A., Herrmann, P.: Recent advancements in intrusion detection systems for the internet of things. Secur. Commun. Netw. 2019 (2019)
[6]
Sultana, N., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer‐to‐Peer Netw. and Appl. 12(2), 493–501 (2019). https://doi.org/10.1007/s12083-017-0630-0
[7]
Wani, A., Revathi, S.: Analyzing threats of IoT networks using SDN based intrusion detection system (SDIoT‐IDS). Commun. Comput. Inf. Sci. 828, 536–542 (2018)
[8]
Valdivieso Caraguay, ÁL., et al.: SDN: Evolution and Opportunities in the Development IoT Applications. Int. J. Distrib. Sens. Netw. 10(5), 735142(2014). https://doi.org/10.1155/2014/735142
[9]
Kiani, F.: A survey on management frameworks and open challenges in IoT. Wirel. Commun. Mob. Comput. 1–33 (2018)
[10]
Da Xu, L., He, W., Li., S.: Internet of things in industries: a survey, IEEE Trans. Ind. Informat. 10(4), 2233–2243 (2014)
[11]
Lu, Y., Da Xu, L.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 6(2), 2103–2115 (2019)
[12]
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
[13]
Azka, W., Revathi, S.: Protocols for secure Internet of Things. Int. J. Educ. Manag. Eng., 7(2), 20–29 (2017)
[14]
Azka., Revathi, S., Geetha.: A survey of applications and security issues in software defined networking. Int J of Comput Netw and Inform Secur. 9(3), 21–28 (2017)
[15]
Li, J., Altman, E., Touati, C.: A General SDN‐based IoT Framework with NVF Implementation. ZTE Communications, ZTE Corporation, 13, pp. 342–45. HAL (2015)
[16]
Vilalta, R., et al.: End‐to‐End SDN Orchestration of IoT Services Using an SDN/NFV‐enabled edge node. In: Optical fiber Conference and Exhibition (OFC), pp. 7–9. (2016)
[17]
Kalkan, K., Zeadally, S.: Securing internet of things with software defined networking. IEEE Communications Magazine, vol. 56(9), pp. 186–192 (2018). https://doi.org/10.1109/mcom.2017.1700714
[18]
Deng, L., et al.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Comput. 1–16. (2018)
[19]
Nobakht, M., Sivaraman, V., Boreli, R.: A host‐based intrusion detection and mitigation framework for smart home IoT using openflow. 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, pp. 47–156 (2016)
[20]
Hosseinpour, A., et al.: An intrusion detection System for fog computing and IoT based logistic systems using a smart data approach an intrusion. Int J Dig Content Technol Appl. 10(5), 34–46 (2016)
[21]
Midi, D., et al.: Kalis – A system for knowledge‐driven adaptable intrusion detection for the internet of things. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, pp. 656–666. (2017)
[22]
Hassan, S., Houbing, A., Malik, K.M.: NBC‐MAIDS: Naïve Bayesian classification technique in multi‐agent system‐enriched IDS for securing IoT against DDoS attacks. J Supercomput, 74(10), 5156–5170 (2018)
[23]
Kumar, V., Das, A.K., Sinha, D.: UIDS: A unified intrusion detection system for IoT environment. Evol. Intell. 0123456789 (2019)
[24]
Deogirikar, J.: Vidhate, A.: Security Attacks in IoT: A Survey. 2017 International Conference on I‐SMAC (IoT in Social, Mobile, Analytics and Cloud) (I‐SMAC), Palladam 32–37 (2017)
[25]
Mishra, P. et al.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686–728 (2019). https://doi.org/10.1109/comst.2018.2847722
[26]
Yuxin, D., Siyi, Z.: Malware detection based on deep learning algorithm. Neural Comput. Appl. 1 (2017)
[27]
Kwon, D., et al.: A survey of deep learning-based network anomaly detection. Cluster Comput. 22(S1), 949–961 (2019). https://doi.org/10.1007/s10586-017-1117-8
[28]
Cakir, B., Dogdu, E.: Malware Classification Using Deep Learning Methods. Association for Computing Machinery, New York, NY, USA (ACMSE '18) (10), 1–5 (2018)
[29]
Srivastava, P.: Essentials of deep learning Introduction to long short term memory. (2017) https://www.analyticsvidhya.com/blog/2017/12/fundamentals-of-deep-learning-introduction-to-lstm/. Accessed 19 Sept 2018
[30]
Olah, C.: Understanding LSTM Networks ‐‐ colah’s blog. (2015) http://colah.github.io/posts/2015-08-Understanding-LSTMs/. Accessed 19 Sept 2018
[31]
Goransson, P., Black, C., Culver, T.: Software Defined Networks: A Comprehensive Approach. Elsevier Science, (2016)
[32]
Wireshark· Go Deep. [Online]. https://www.wireshark.org/ (2019). Accessed 22 Jan 2019
[33]
Ajaeiya, G.A., Ids, A.B. F.: Flow‐Based Intrusion Detection System for SDN. (2017)
[34]
Hindy, H., et al.: A taxonomy and Survey of Intrusion detection System design Techniques. Netw. Threats Datasets. 8, 104650–104675 (2020). https://doi.org/10.1109/access.2020.3000179
[35]
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new Intrusion detection dataset and Intrusion Traffic characterization. 108–116 (2018)
[36]
Berman D., et al.: A survey of deep learning methods for cyber security. Information. 10(4), 122 (2019). https://doi.org/10.3390/info10040122
[37]
Fontes, R.R., Afzal, S., Brito, S. H., Santos, M. A., Rothenberg, C.E.: Mininet‐WiFi: Emulating software‐defined wireless networks. In: Proceedings of 11th International Conference on Network and Service Management CNSM 2015, pp. 384–389, IEEE, Barcelona, 9 November (2015)
[38]
Heller, B.: OpenFlow Switch specification 1.0.0. Current. 1–36 (2009)

Cited By

View all
  • (2024)Evaluation of contemporary intrusion detection systems for internet of things environmentMultimedia Tools and Applications10.1007/s11042-023-15918-583:3(7541-7581)Online publication date: 1-Jan-2024
  • (2024)IoT‐based energy efficient and longer lifetime compression approach for healthcare applicationsTransactions on Emerging Telecommunications Technologies10.1002/ett.484335:4Online publication date: 8-Apr-2024
  • (2023)Digitalization of the Business Environment and Innovation Efficiency of Chinese ICT FirmsJournal of Organizational and End User Computing10.4018/JOEUC.32736535:3(1-25)Online publication date: 14-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image CAAI Transactions on Intelligence Technology
CAAI Transactions on Intelligence Technology  Volume 6, Issue 3
September 2021
125 pages
EISSN:2468-2322
DOI:10.1049/cit2.v6.3
Issue’s Table of Contents
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 03 March 2021

Author Tags

  1. Internet of Things
  2. software defined networking
  3. protocols
  4. computer network security
  5. deep learning (artificial intelligence)
  6. telecommunication computing

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Evaluation of contemporary intrusion detection systems for internet of things environmentMultimedia Tools and Applications10.1007/s11042-023-15918-583:3(7541-7581)Online publication date: 1-Jan-2024
  • (2024)IoT‐based energy efficient and longer lifetime compression approach for healthcare applicationsTransactions on Emerging Telecommunications Technologies10.1002/ett.484335:4Online publication date: 8-Apr-2024
  • (2023)Digitalization of the Business Environment and Innovation Efficiency of Chinese ICT FirmsJournal of Organizational and End User Computing10.4018/JOEUC.32736535:3(1-25)Online publication date: 14-Aug-2023
  • (2023)DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptographyFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-022-2193-318:1Online publication date: 12-Aug-2023
  • (2023)Secure and energy efficient dynamic hierarchical load balancing framework for cloud data centersMultimedia Tools and Applications10.1007/s11042-023-14809-z82:19(29843-29856)Online publication date: 16-Mar-2023
  • (2023)Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCPMobile Networks and Applications10.1007/s11036-023-02108-828:2(839-852)Online publication date: 28-Feb-2023
  • (2023)Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification ModelMobile Networks and Applications10.1007/s11036-023-02105-x28:2(795-807)Online publication date: 7-Feb-2023
  • (2023)MACPABEInternational Journal of Network Management10.1002/nem.220033:3Online publication date: 9-May-2023
  • (2023)Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcareTransactions on Emerging Telecommunications Technologies10.1002/ett.471634:11Online publication date: 2-Jan-2023
  • (2022)Fault-Tolerant SDN Solution for Cybersecurity ApplicationsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544479(1-6)Online publication date: 23-Aug-2022

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media