Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

With 5G technology driving its expansion as the main infrastructure for pervasive connection, the Internet of Things (IoT) symbolises a paradigm-shifting interconnectivity of objects and devices. The increasing integration of IoT devices into our daily lives poses serious security and privacy risks. Every smart object in an urban setting is connected, which increases the vulnerability of IoT-based smart cities to various security risks. It is crucial to guarantee these digital urban settings’ security and resilience, especially as cities become more computerised and have a dense population of linked devices. Ensuring the integrity and functionality of smart cities requires immediate attention to detecting and mitigating potential cyberattacks. This research presents an intrusion detection model derived from data extracted by simulating the SYNFLOOD attack scenario, a prominent form of Denial of Service attack in IoT security. The suggested detection model classifies, trains, and validates the imported data using the k-folds method and creates a unique detection model. The proposed model is fast and effectively enables all IoT networks to communicate information without compromising privacy. The model enhances the detection process by employing data preprocessing and balancing. In this work, the experiments’ accuracy is stable, proving the model’s success for the six used machine learning algorithms resulted in an excellent performance with an accuracy of 92.3% for the Decision Tree and Neural Network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Aburomman, A.A., Reaz, M.B.I.: Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. In: 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), pp. 636–640. IEEE, Xi’an, China (2016)

  2. Afaneh, S., Al-Mousa, M.R., Al-hamid, H.S., Bara’h Suliman, A.-A., Alia, M., Almimi, H., Alkhatib, A.A.: Security challenges review in Agile and DevOps practices. In: 2023 International Conference on Information Technology (ICIT), pp. 102–107. IEEE, Amman, Jordan (2023)

  3. Al-Jarrah, O.Y., Al-Hammdi, Y., Yoo, P.D., Muhaidat, S., Al-Qutayri, M.: Semi-supervised multi-layered clustering model for intrusion detection. Digit. Commun. Netw. 4(4), 277–286 (2018)

    Article  Google Scholar 

  4. Hasan, M., Islam, M.M., Zarif, M.I.I., Hashem, M.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019)

    Article  Google Scholar 

  5. Adeyemo, V.E., Abdullah, A., JhanJhi, N., Supramaniam, M., Balogun, A.O.: Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int. J. Adv. Comput. Sci. Appl. 10(9), 520–528 (2019)

    Google Scholar 

  6. Kumar, E.V., Reddy, B.I.: A review on application of data mining techniques for intrusion detection. Int. Res. J. Eng. Technol. 6, 1457–1460 (2019)

    Google Scholar 

  7. Hu, N., Tian, Z., Lu, H., Du, X., Guizani, M.: A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. Int. J. Mach. Learn. Cybern. 12(11), 3129–3144 (2021)

    Article  Google Scholar 

  8. Roopak, M., Tian, G.Y., Chambers, J.: 2019 Deep learning models for cyber security in IoT networks. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452–0457. IEEE, Las Vegas, NV, USA (2019)

  9. Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)

    Article  Google Scholar 

  10. Otoum, Y., Liu, D., Nayak, A.: DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 33(3), e3803 (2022)

    Article  Google Scholar 

  11. Mughaid, A., Alqahtani, A., AlZu’bi, S., Obaidat, I., Alqura’n, R., AlJamal, M., AL-Marayah, R.: Utilizing machine learning algorithms for effectively detection IoT DDoS attacks. In: International Conference on Advances in Computing Research, pp. 617–629. Springer, Berlin (2023)

  12. Pande, S., Khamparia, A., Gupta, D., Thanh, D.N.: DDoS detection using machine learning technique. In: Recent Studies on Computational Intelligence, pp. 59–68. Springer, Berlin (2021)

  13. Almiani, M., AbuGhazleh, A., Jararweh, Y., Razaque, A.: DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int. J. Mach. Learn. Cybern. 12(11), 3337–3349 (2021)

    Article  Google Scholar 

  14. Maabreh, M., Obeidat, I., Elsoud, E.A., Alnajjar, A., Alzyoud, R., Darwish, O.: Towards data-driven network intrusion detection systems: features dimensionality reduction and machine learning. Int. J. Interact. Mob. Technol. 17(14), 123 (2022)

    Article  Google Scholar 

  15. Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., Elsoud, E.A.: An intelligent cyber security phishing detection system using deep learning techniques. Clust. Comput. 25, 1–10 (2022)

    Article  Google Scholar 

  16. Mughaid, A., AlZu’bi, S., Alnajjar, A., AbuElsoud, E., Salhi, S.E., Igried, B., Abualigah, L.: Improved dropping attacks detecting system in 5G networks using machine learning and deep learning approaches. Multimed. Tools Appl. 82, 1–23 (2022)

    Google Scholar 

  17. Wang, D., Song, B., Chen, D., Du, X.: Intelligent cognitive radio in 5G: AI-based hierarchical cognitive cellular networks. IEEE Wirel. Commun. 26(3), 54–61 (2019)

    Article  Google Scholar 

  18. Daud, M., Rasiah, R., George, M., Asirvatham, D., Rahman, A.F.A., Ab Halim, A.: Denial of service: (DoS) impact on sensors. In: 2018 4th International Conference on Information Management (ICIM), pp. 270–274. IEEE (2018)

  19. Mosenia, A., Jha, N.K.: A comprehensive study of security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2016). https://doi.org/10.1109/TETC.2016.2606384

    Article  Google Scholar 

  20. Jamal, H., Huzaifa, M., Sodunke, M.A., Odiete, J.O.: Smart heat stress and toxic gases monitoring instrument with a developed graphical user interface using IoT. In: 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1–6. IEEE (2019)

  21. Kodali, R.K., Rajanarayanan, S.C.: IoT based indoor air quality monitoring system. In: 2019 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), pp. 1–5. IEEE (2019). https://doi.org/10.1109/WiSPNET45539.2019.9032855

  22. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the dos and DDoS problems. ACM Comput. Surv. (CSUR) 39(1), 1–46 (2007). https://doi.org/10.1145/1216370.1216373

    Article  Google Scholar 

  23. Labovitz, C., McPherson, D., Iekel-Johnson, S., Hollyman, M.: Internet traffic trends. In: NANOG, vol. 43, pp. 1–20 (2008)

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors worked in an equivalent load at all stages to produce this research.

Corresponding author

Correspondence to Ala Mughaid.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mughaid, A., Alnajjar, A., El-Salhi, S.M. et al. A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks. Cluster Comput 27, 10359–10375 (2024). https://doi.org/10.1007/s10586-024-04495-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04495-3

Keywords