Bi-level Flow Based Anomalous Activity Identification System for IoT Devices

Authors

  • Meenigi Ramesh Babu School of Electronics and communication Engineering, Reva University, Bangalore, Karnataka, India https://orcid.org/0000-0003-0136-2639
  • K. N. Veena School of Electronics and communication Engineering, Reva University, Bangalore, Karnataka, India

DOI:

https://doi.org/10.13052/jmm1550-4646.1814

Keywords:

IoT; Security; Neural Network; Anomalies Behaviour; Optimization.

Abstract

With the advanced technologies, IoT has widely emerged with data collection, processing, and communication as well in smart applications. The wireless medium in the IoT devices would broadcast the data, which makes them easily targeted by the attacks. In the local network, the normal communication attack is restricted to small local domain or local nodes. However, the attack present in IoT devices gets expanded to a large area that would cause destructive effects. The heterogeneity and distribution of IoT services/applications make the security of IoT a more challenging and complex one. This paper aims to propose a bi-level flow based anomalous activity identification system in IoT. Initially, the flow based features get extracted along with the statistical features like mean, median, variance, correlation, and correntropy. Subsequently, Bi-level classification is carried out in this work. In level 1, the presence of attack is detected and the level 2 classification classifies the type of attack. A decision tree is used for detecting the attacks by checking whether the network traffic is anomalous traffic or normal traffic. In level 2, an Optimized Neural network (NN) is used for categorizing the attacks in IoT with the knowledge of flow features and statistical features. To make the detection and classification more accurate, the weight of NN will be optimally tuned by a new Combined Whale SeaLion Algorithm (CWSA) that hybridizes the concepts of both SLnO and WOA. At last, the performance of the adopted method is computed over other traditional models in terms of accuracy, sensitivity, specificity, precision, FPR, FDR, FNR, NPV, F1-score, and MCC.

Downloads

Download data is not yet available.

Author Biographies

Meenigi Ramesh Babu, School of Electronics and communication Engineering, Reva University, Bangalore, Karnataka, India

Meenigi Ramesh Babu is a Research scholar in school of Electronics and communication Engineering, Reva University, Bangalore, Karnataka, India. He has received M.Tech Digital Systems and Computer Electronics from Jawaharlal Nehru Technological University (JNTU), Anantapur, Alpha has received B.Tech Degree from KSRM College of engineering, Kadapa, which is affiliated to Sri Venkateshwara University, Tirupati. He presented papers in international and national conferences. His area of interest is Internet of Things attacks detection model using Deep learning.

K. N. Veena, School of Electronics and communication Engineering, Reva University, Bangalore, Karnataka, India

K. N. Veena is currently working as Associate Professor in the school of Electronics and Communication Engineering, REVA University. She has won national level teachers’ competition in Robotics conducted by IIT Bombay in 2013. She has 2 patents published and 6 patents filed in the field of Robotics. She has published paper in National and International conference and journals. She is currently guiding 4 PhD students, Her research area are Sensor networks, Computational Intelligence and Robotics.

References

P. Sudhakaran and C. Malathy, “Authorisation, attack detection and avoidance framework for IoT devices,” IET Networks, vol. 9, no. 5, pp. 209–214, 9 2020, doi: 10.1049/iet-net.2019.0167.

M. Hossain and J. Xie, “Third Eye: Context-Aware Detection for Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 1, pp. 214–228, March 2020, doi: 10.1109/TCCN.2020.2968324.

Shailendra Rathore, Jong Hyuk Park, “Semi-supervised learning based distributed attack detection framework for IoT”, Applied Soft Computing, vol. 72, pp. 79–89, Nov 2018.

Liang Liu, Zuchao Ma, Weizhi Meng, “Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks”, Future Generation Computer Systems, vol. 101, pp. 865–879, Dec 2019.

S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N. Chilamkurti, S. Ganesan and R. Patan, “Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network,” IEEE Access, vol. 8, pp. 77396–77404, 2020, doi: 10.1109/ACCESS.2020.2986013.

A. Raoof, A. Matrawy and C. Lung, “Routing Attacks and Mitigation Methods for RPL-Based Internet of Things,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1582–1606, Secondquarter 2019, doi: 10.1109/COMST.2018.2885894.

F. Farivar, M. S. Haghighi, A. Jolfaei and M. Alazab, “Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2716–2725, April 2020, doi: 10.1109/TII.2019.2956474.

S. Latif, Z. Zou, Z. Idrees and J. Ahmad, “A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network,” IEEE Access, vol. 8, pp. 89337–89350, 2020, doi: 10.1109/ACCESS.2020.2994079.

Abebe Abeshu Diro, Naveen Chilamkurti, “Distributed attack detection scheme using deep learning approach for Internet of Things”, Future Generation Computer Systems, vol. 82, pp. 761–768, may 2018.

N. Ravi and S. M. Shalinie, “Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3559–3570, April 2020, doi: 10.1109/JIOT.2020.2973176.

A. Y. Khan, R. Latif, S. Latif, S. Tahir, G. Batool and T. Saba, “Malicious Insider Attack Detection in IoTs Using Data Analytics,” IEEE Access, vol. 8, pp. 11743–11753, 2020, doi: 10.1109/ACCESS.2019.2959047.

A. Samy, H. Yu and H. Zhang, “Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning,” IEEE Access, vol. 8, pp. 74571–74585, 2020, doi: 10.1109/ACCESS.2020.2988854. Zuchao Ma, Liang Liu, Weizhi Meng, “Towards multiple-mix-attack detection via consensus-based trust management in IoT networks”, Computers & Security, vol. 96, Art.no. 101898, Sep 2020.

Zubair A. Baig, Surasak Sanguanpong, Chakchai So-In, “Averaged dependence estimators for DoS attack detection in IoT networks”, Future Generation Computer Systems, vol. 102, pp. 198–209, Jan 2020.

Zuchao Ma, Liang Liu, Weizhi Meng, “Towards multiple-mix-attack detection via consensus-based trust management in IoT networks”, Computers & Security, vol. 96, Art.no. 101898, Sep 2020

H. Al-Hamadi, I.-R. Chen, D.-C. Wang and M. Almashan, “Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems,” IEEE Access, vol. 8, pp. 168994–169009, 2020, doi: 10.1109/ACCESS.2020.3023616.

V. Sharma, I. You, K. Yim, I. Chen and J. Cho, “BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems,” IEEE Access, vol. 7, pp. 118556–118580, 2019, doi: 10.1109/ACCESS.2019.2917135.

I. Hafeez, M. Antikainen, A. Y. Ding and S. Tarkoma, “IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge,” IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 45–59, March 2020, doi: 10.1109/TNSM.2020.2966951.

D. Yin, L. Zhang and K. Yang, “A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework,” IEEE Access, vol. 6, pp. 24694–24705, 2018, doi: 10.1109/ACCESS.2018.2831284.

H. H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha and K. R. Choo, “A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks,” IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 2, pp. 314–323, 1 April–June 2019, doi: 10.1109/TETC.2016.2633228.

Q. Shafi, A. Basit, S. Qaisar, A. Koay and I. Welch, “Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network,” IEEE Access, vol. 6, pp. 73713–73723, 2018.

Yisroel Mirsky, Tomer Golomb, Yuval Elovici, “Lightweight collaborative anomaly detection for the IoT using blockchain” Journal of Parallel and Distributed Computing, vol. 145, pp. 75–97, Nov 2020.

Kashif Naseer Qureshi, Shahid Saeed Rana, Awais Ahmed, Gwanggil Jeon, “A Novel and Secure Attacks Detection Framework for Smart Cities Industrial Internet of Things” Sustainable Cities and Society In press, journal pre-proof Available online, Art.no. 102343, 20 June 2020.

Syed Rizvi, RJ Orr, Austin Cox, Prithvee Ashokkumar, Mohammad R. Rizvi, “Identifying the attack surface for IoT network”, Internet of Things, vol. 9, Art.no. 100162, March 2020.

Y. Liu, M. Ma, X. Liu, N. N. Xiong, A. Liu and Y. Zhu, “Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 1, pp. 356–372, 1 Jan.–March 2020, doi: 10.1109/TNSE.2018.2881152.

A. Tandon, T. J. Lim and U. Tefek, “Sentinel based malicious relay detection in wireless IoT networks,” Journal of Communications and Networks, vol. 21, no. 5, pp. 458–468, Oct. 2019, doi: 10.1109/JCN.2019.000049.

Seyedali Mirjalili and Andrew Lewis, “The Whale Optimization Algorithm”, Advances in Engineering Software, vol. 95, pp. 51–67, 2016.

Masadeh, Raja, Mahafzah, Basel and Sharieh, Ahmad. “Sea Lion Optimization Algorithm”, International Journal of Advanced Computer Science and Applications, vol. 10, pp. 388–395, 2019.

M. Marsaline Beno, Valarmathi I. R, Swamy S. M and B. R. Rajakumar, “Threshold prediction for segmenting tumour from brain MRI scans”, International Journal of Imaging Systems and Technology, Vol. 24, No. 2, pp. 129–137, 2014.

Mahmudul Hasan, Md. Milon Islam, Md. Ishrak Islam Zarif, M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches”, Internet of Things, vol. 7, Art.no. 100059, Sep 2019.

K. Krishna Jyothi, Shilpa Chaudhari, “Optimized neural network model for attack detection in LTE network”, Computers & Electrical Engineering, vol. 88, Art.no. 106879, Dec 2020.

Ming-Yang Su, “Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers”, Expert Systems with Applications, vol. 38, no. 4, pp. 3492–3498, April 2011.

Reda M. Elbasiony, Elsayed A. Sallam, Mahmoud M. Fahmy, “A hybrid network intrusion detection framework based on random forests and weighted k-means” Ain Shams Engineering Journal, vol. 4, no. 4, pp. 753–762, Dec 2013.

Wang Chao, Wang Junzheng, “Cloud-service decision tree classification for education platform”, Cognitive Systems Research, vol. 52, pp. 234–239, Dec 2018.

Kangyi Wang, “Network data management model based on Naïve Bayes classifier and deep neural networks in heterogeneous wireless networks”, Computers & Electrical Engineering, vol. 75, pp. 135–145, May 2019.

V. Tejaswini and Dr. D. Susitra, “Hybrid PSO-WOA for Solving ORPD Problem under Unbalanced Conditions”, Journal of Computational Mechanics, Power System and Control, Vol. 2, No. 2, pp. 10–20, 2019.

Vinolin V and S Vinusha, “Enhancement in Biodiesel Blend with the Aid of Neural Network and SAPSO”, Journal of Computational Mechanics, Power System and Control, Vol. 1, No. 1, pp. 11–17, 2018.

Inumula Veeraraghava Rao, Malleswara Rao V, “An Enhanced Whale Optimization Algorithm for Massive MIMO System”, Journal of Networking and Communication Systems, Vol. 2, No. 4, pp. 12–22, 2019.

R. Cristin, Dr. V. Cyril Raj and Ramalatha Marimuthu, “Face Image Forgery Detection by Weight Optimized Neural Network Model”, Multimedia Research, Vol. 2, No. 2, pp. 19–27, 2019.

Nipanikar S I, Hima Deepthi V, “Enhanced Whale Optimization Algorithm and Wavelet Transform for Image Steganography”, Multimedia Research, Vol. 2, No. 3, pp. 23–32, 2019.

Chithra R S, Jagatheeswari P, “Enhanced WOA and Modular Neural Network for Severity Analysis of Tuberculosis”, Multimedia Research, Vol. 2, No. 3, pp. 43–55, 2019.

https://en.wikipedia.org/wiki/Statistic.

Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networks”, 2014 First International Conference on Networks & Soft Computing, ISSN: 978-1-4799-3486-7/14, pp. 270–273, August 2014.

A Murali, K Hari Kishore, C P Rama Krishna, S Kumar, A Trinadha Rao “Integrating the Reconfigurable Devices using Slow-changing Key Technique to achieve High Performance”, Proceedings 7th IEEE International Advance Computing Conference, IACC 2017, 7976849 ISSN: 2473-3571, pp. 530–534, July 2017.

Avinash Yadlapati, Kakarla Hari Kishore, “Constrained Level Validation of Serial Peripheral Interface Protocol”, Proceedings of the First International Conference on SCI 2016, Volume 1, Smart Innovation, Systems and Technologies 77 (Publisher: Springer Nature Singapore Pvt. Ltd), ISSN No: 2190–3018, ISBN: 978-981-10-5544-7, Chapter No: 77, pp. 743–753, 25th December 2017.

Published

2021-08-31

How to Cite

Babu, M. R., & Veena, K. N. (2021). Bi-level Flow Based Anomalous Activity Identification System for IoT Devices. Journal of Mobile Multimedia, 18(1), 61–88. https://doi.org/10.13052/jmm1550-4646.1814

Issue

Section

Enabling AI Technologies Towards Multimedia Data Analytics for Smart Healthcare