Abstract
Security represents one of the main critical issues in the Internet of Things (IoT), especially the routing attacks in the core network where the loss of information becomes very harmful. This paper proposes a novel scheme called deep learning-based early stage detection (DL-ESD) using IoT routing attack dataset (IRAD), including hello flood (HF), decreased rank (DR), and version number (VN) to enhance the detection capability of routing attacks. The experiments have been performed in three phases: (i) features extraction using linear discriminant analysis (LDA), which aims to generate features more distinguishable from each other, (ii) the features normalization using min–max scaling to eliminate the worst overfittings to the existence of fewer data points in training samples, and (iii) selection the substantial features. The binary classification methods have been employed to measure the proposed model’s training efficiency. We have performed the training stage on deep learning techniques such as logistic regression (LR), K-nearest neighbors (KNN), support vector machine (SVM), naïve Bayes (NB), and multilayer perceptron (MLP). The comparison results illustrate that the proposed MLP classifier has a high training accuracy and the best runtime rate. Consequently, the proposed scheme achieved prediction accuracy reaching 98.85%, precision of 97.50%, recall rate 98.33%, and 97.01% F1 score rate with better performance than state-of-the-art studies.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Internet routing attacks data used in this study is available at link: https://www.github.com/iot-attacks/irad.
References
Chen S, Xu H, Liu D et al (2014) A vision of IoT: applications, challenges, and opportunities with China perspective. IEEE Internet Things J 1:349–359. https://doi.org/10.1109/JIOT.2014.2337336
Ye J, Cheng X, Zhu J et al (2018) A DDoS attack detection method based on SVM in software defined network. Secur Commun Netw. https://doi.org/10.1155/2018/9804061
Li Y, Zuo Y, Song H et al (2021) Deep learning in security of Internet of Things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3106898
Liu D, Yan Z, Ding W et al (2019) A survey on secure data analytics in edge computing. IEEE Internet Things J 6:4946–4967. https://doi.org/10.1109/JIOT.2019.2897619
Mahmoud R, Yousuf T, Aloul F et al (2016) Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th Int Conf Internet Technol Secur Trans ICITST 2015, pp 336–41. https://doi.org/10.1109/ICITST.2015.7412116
Mazhar MS, Saleem Y, Almogren A et al (2022) Forensic analysis on Internet of Things (IoT) device using machine-to-machine (M2M) framework. Electron 11:1126. https://doi.org/10.3390/ELECTRONICS11071126
Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3:854–864. https://doi.org/10.1109/JIOT.2016.2584538
Srivastava A, Gupta BB, Tyagi A et al (2011) A recent survey on DDoS attacks and defense mechanisms. Commun Comput Inf Sci (CCIS) 203:570–580. https://doi.org/10.1007/978-3-642-24037-9_57
Chang TY, Hsieh CJ (2018) Detection and analysis of distributed denial-of-service in internet of things-employing artificial neural network and apache spark platform. Sens Mater 30:857–867. https://doi.org/10.18494/SAM.2018.1789
Almusaylim ZA, Jhanjhi NZ, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors (Switzerland) 20:1–25. https://doi.org/10.3390/s20215997
Musaddiq A, Zikria YB, Zulqarnain et al (2020) Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw 2020:1–23. https://doi.org/10.1186/S13638-020-1645-4/TABLES/11
Butun I, Osterberg P, Song H (2020) Security of the Internet of Things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutorials 22:616–644. https://doi.org/10.1109/COMST.2019.2953364
Harbi Y, Aliouat Z, Refoufi A et al (2021) Recent security trends in internet of things: a comprehensive survey. IEEE Access 9:113292–113314. https://doi.org/10.1109/ACCESS.2021.3103725
Raoof A, Matrawy A, Lung CH (2019) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutorials 21:1582–1606. https://doi.org/10.1109/COMST.2018.2885894
Kim J, Kim J, Thu HLT et al (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 Int Conf Platf Technol Serv PlatCon 2016—Proc Published Online First: 19 April 2016. https://doi.org/10.1109/PLATCON.2016.7456805
Saeed A, Ahmadinia A, Javed A et al (2016) Intelligent intrusion detection in low-power IoTs. ACM Trans Internet Technol. https://doi.org/10.1145/2990499
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768. https://doi.org/10.1016/j.future.2017.08.043
Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for Internet of Things using deep learning. IEEE Access 8:74571–74585. https://doi.org/10.1109/ACCESS.2020.2988854
Kamel SOM (2020) Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network. IJCNIS. https://doi.org/10.5815/ijcnis.2020.04.02
Nayak S, Ahmed N, Misra S (2021) Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw 123:1570–8705. https://doi.org/10.1016/J.ADHOC.2021.102661
Qureshi KN, Rana SS, Ahmed A et al (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc 61:102343. https://doi.org/10.1016/J.SCS.2020.102343
Qasem ZAH, Esmaiel H, Sun H et al (2019) Enhanced fully generalized spatial modulation for the internet of underwater things. Sensors (Switzerland) 19:1–16. https://doi.org/10.3390/s19071519
Thamilarasu G, Chawla S (2019) Towards deep-learning-driven intrusion detection for the internet of things. Sensors (Switzerland). https://doi.org/10.3390/s19091977
Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58. https://doi.org/10.2991/ijcis.2018.25905181
Seth AD, Biswas S, Dhar AK (2020) Detection and verification of decreased rank attack using round-trip times in RPL-based 6LoWPAN networks. In: Int Symp Adv Networks Telecommun Syst ANTS 2020, December 2020, pp 3–8. https://doi.org/10.1109/ANTS50601.2020.9342754
Sharma S, Kumar VV (2021) AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. J Supercomput. https://doi.org/10.1007/s11227-021-03833-1
Prakash PJ, Lalitha B, Prakash PJ et al (2022) Optimized ensemble classifier based network intrusion detection system for RPL based Internet of Things keywords Internet of Things · RPL based IoT · Intrusion detection system · Voting ensemble classifier · Feature selection. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09726-7
Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778–4812. https://doi.org/10.1007/s11227-020-03471-z
Osman M, He J, Mahiuob F et al (2021) Artificial neural network model for decreased rank attack detection in RPL based on IoT networks. Int J Netw Secur. https://doi.org/10.6633/IJNS.202105
Manne VRJ, Sreekanth S (2022) Detection and mitigation of RPL routing attacks in Internet of Things. In: Proc 2022 9th Int Conf Comput Sustain Glob Dev INDIACom 2022 2022, pp 481–5. https://doi.org/10.23919/INDIACOM54597.2022.9763140
Zannone N, Alaa Al-Amiedy T, Anbar M et al (2022) A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things. Sensors. https://doi.org/10.3390/s22093400
Palattella MR, Accettura N, Vilajosana X et al (2013) Standardized protocol stack for the internet of (important) things. IEEE Commun Surv Tutorials 15:1389–1406. https://doi.org/10.1109/SURV.2012.111412.00158
Agiollo A, Conti M, Member S et al (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18:1178–1190
Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manag 14:472–486. https://doi.org/10.1109/TNSM.2017.2705290
Llns I (2021) A holistic framework for prediction of routing attacks. J Supercomput. https://doi.org/10.1007/s11227-021-03922-1
Sarhan M, Layeghy S, Moustafa N et al (2021) Feature extraction for machine learning-based intrusion detection in IoT networks. http://arxiv.org/abs/2108.12722
Moustafa N, Member S, Slay J et al (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2017.2715166
Ghaleb B, Al-Dubai AY, Ekonomou E et al (2019) A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Commun Surv Tutorials 21:1607–1635. https://doi.org/10.1109/COMST.2018.2874356
Roy D, Murty KSR, Mohan CK (2015) Feature selection using Deep Neural Networks. In: Proc Int Jt Conf Neural Networks 2015, 2015 September. https://doi.org/10.1109/IJCNN.2015.7280626
Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection R. Pattern Recognit Lett 51:1–7
Singh K, Dhindsa KS, Nehra D (2020) T-CAD: a threshold based collaborative DDoS attack detection in multiple autonomous systems. J Inf Secur Appl 51:102457. https://doi.org/10.1016/j.jisa.2020.102457
Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: Int Conf Signal Process Commun Eng Syst—Proc SPACES 2015, Assoc with IEEE 2015, pp 92–6. https://doi.org/10.1109/SPACES.2015.7058223
Acknowledgements
This work is supported by National Natural Science Foundation of China under Grant Nos: 61572095 and 61877007.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Albishari, M., Li, M., Zhang, R. et al. Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks. J Supercomput 79, 2626–2653 (2023). https://doi.org/10.1007/s11227-022-04753-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04753-4