Document Type : Technical Paper

Authors

Department of Computer Engineering, Yazd University, Yazd, Iran.

Abstract

The Internet of Things (IoT) has emerged as a rapidly growing technology that enables seamless connectivity between a wide variety of devices. However, with this increased connectivity comes an increased risk of cyber-attacks. In recent years, the development of intrusion detection systems (IDS) has become critical for ensuring the security and privacy of IoT networks. This article presents a study that evaluates the accuracy of an intrusion detection system (IDS) for detecting network attacks in the Internet of Things (IoT) network. The proposed IDS uses the Decision Tree Classifier and is tested on four benchmark datasets: NSL-KDD, BOT-IoT, CICIDS2017, and MQTT-IoT. The impact of noise on the training and test datasets on classification accuracy is analyzed. The results indicate that clean data has the highest accuracy, while noisy datasets significantly reduce accuracy. Furthermore, the study finds that when both training and test datasets are noisy, the accuracy of classification decreases further. The findings of this study demonstrate the importance of using clean data for training and testing an IDS in IoT networks to achieve accurate classification. This research provides valuable insights for the development of a robust and accurate IDS for IoT networks.

Keywords

Main Subjects

[1] E. Gyamfi and A. D. Jurcut, “Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM,” IEEE Internet of Things Journal, vol. 10, no. 5, pp. 3827–3839, Mar. 2023, doi: 10.1109/JIOT.2022.3172393.
 
[2] X. Deng, J. Zhu, X. Pei, L. Zhang, Z. Ling, and K. Xue, “Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks,” IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 684–696, Mar. 2023, doi: 10.1109/TNSM.2022.3213807.
 
[3] Y. Wu, L. Nie, S. Wang, Z. Ning, and S. Li, “Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach,” IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3094–3106, Feb. 2023, doi: 10.1109/JIOT.2021.3112159.
 
[4] J. Wu et al., “Joint semantic transfer network for IoT intrusion detection,” IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3368–3383, Feb. 2023, doi: 10.1109/JIOT.2022.3218339.
 
[5] P. Ruzafa-Alcázar et al., “Intrusion detection based on privacy-preserving federated learning for the industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1145–1154, Feb. 2023, doi: 10.1109/TII.2021.3126728.
 
[6] J. Long, W. Liang, K.-C. Li, Y. Wei, and M. D. Marino, “A regularized cross-layer ladder network for intrusion detection in industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1747–1755, Feb. 2023, doi: 10.1109/TII.2022.3204034.
 
[7] A. Oseni et al., “An explainable deep learning framework for resilient intrusion detection in IoT-Enabled transportation networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 1, pp. 1000–1014, Jan. 2023, doi: 10.1109/TITS.2022.3188671.
 
[8] Sk. T. Mehedi, A. Anwar, Z. Rahman, K. Ahmed, and R. Islam, “Dependable intrusion detection system for IoT: A deep transfer learning based approach,” IEEE Transactions on Industrial Informatics, Vol. 19, No. 1, pp. 1006–1017, Jan. 2023, doi: 10.1109/TII.2022.3164770.
 
[9] S. Bebortta, S. K. Das, and S. Chakravarty, “Fog-enabled intelligent network intrusion detection framework for internet of things applications,” in 13th international conference on cloud computing, data science & engineering (confluence), Jan. 2023, pp. 485–490. doi: 10.1109/Confluence56041.2023. 10048841.
 
[10] M. M. Alani and A. I. Awad, “An intelligent two-layer intrusion detection system for the internet of things,” IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 683–692, Jan. 2023, doi: 10.1109/TII.2022.3192035.
 
[11] J. Wu, H. Dai, Y. Wang, K. Ye, and C. Xu, “Heterogeneous domain adaptation for IoT intrusion detection: A geometric graph alignment approach,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3239872.
 
[12] A. Thakkar and R. Lohiya, “Attack classification of imbalanced intrusion data for IoT network using ensemble learning-based deep neural network,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3244810.
 
[13] A. A. M. Sharadqh, H. Hatamleh, A. M. A. Alnaser, S. S. Saloum, and T. A. Alawneh, “Hybrid chain: Blockchain enabled framework for bi-level intrusion detection and graph-based mitigation for security provisioning in edge assisted IoT environment,” IEEE Access, pp. 1–1, 2023, doi: 10.1109/ACCESS.2023.3256277.
 
[14] Z. Ma, L. Liu, W. Meng, X. Luo, L. Wang, and W. Li, “ADCL: Towards an adaptive network intrusion detection system using collaborative learning in IoT networks,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3248259.
 
[15] I. A. Kandhro et al., “Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023, doi: 10.1109/ACCESS.2023.3238664.
 
[16] A. Telikani, J. Shen, J. Yang, and P. Wang, “Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 23260–23271, Nov. 2022, doi: 10.1109/JIOT.2022.3188224.
 
[17] O. Abdel Wahab, “Intrusion detection in the IoT under data and concept drifts: Online deep learning approach,” IEEE Internet of Things Journal, vol. 9, no. 20, pp. 19706–19716, Oct. 2022, doi: 10.1109/JIOT.2022.3167005.
 
[18] W. Liang, Y. Hu, X. Zhou, Y. Pan, and K. I.-K. Wang, “Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5087–5095, Aug. 2022, doi: 10.1109/TII.2021.3116085.
 
[19] X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I.-K. Wang, “Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system,” IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9310–9319, Jun. 2022, doi: 10.1109/JIOT.2021.3130434.
 
[20] T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and F. T. H. den Hartog, “ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 485–496, Jan. 2022, doi: 10.1109/JIOT.2021.3085194.
 
[21] M. Zeeshan et al., “Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and bot-IoT data-sets,” IEEE Access, vol. 10, pp. 2269–2283, 2022, doi: 10.1109/ACCESS.2021.3137201.
 
[22] H. Siddharthan, T. Deepa, and P. Chandhar, “SENMQTT-SET: An intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features,” IEEE Access, vol. 10, pp. 33095–33110, 2022, doi: 10.1109/ACCESS.2022.3161566.
 
[23] M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Rafiq, and W. A. M. Abdullah, “Towards SDN-Enabled, intelligent intrusion detection system for internet of things (IoT),” IEEE Access, vol. 10, pp. 22756–22768, 2022, doi: 10.1109/ACCESS.2022.3153716.
 
[24] C. Miranda, G. Kaddoum, A. Boukhtouta, T. Madi, and H. A. Alameddine, “Intrusion prevention scheme against rank attacks for software-defined low power IoT networks,” IEEE Access, vol. 10, pp. 129970–129984, 2022, doi: 10.1109/ACCESS.2022.3228170.
 
[25] P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti, and T.-H. Kim, “Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey,” IEEE Access, vol. 10, pp. 121173–121192, 2022, doi: 10.1109/ACCESS.2022.3220622.
 
[26] Y. Yang, K. Zheng, C. Wu, and Y. Yang, Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network, Sensors, vol. 19, pp02528, 2019.
 
[27] M. Yadollahzadeh Tabari; Z. Mataji, Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol, Journal of AI and Data Mining, vol. 9, no. 1, January 2021, Pages73-85.
 
[28] L. khalvati; M. Keshtgary; N. Rikhtegar, Intrusion Detection based on a Novel Hybrid Learning Approach, journal of AI and Data Mining, Volume 6, Issue 1 , March 2018, Pages 157-162, doi.org/10.22044/jadm.2017.979 .