Skip to main content

A Heuristic Intrusion Detection System for Internet-of-Things (IoT)

  • Conference paper
  • First Online:
Book cover Intelligent Computing (CompCom 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 997))

Included in the following conference series:

Abstract

Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for a major technological revolution towards the development of advanced modern computer networks connecting physical objects around us. The emergence of IPv6 and installation of open access public networks is attracting cyber-criminals to compromise the user specific security information. This is why the security breaches in IoT devices are dominating the headlines lately. In this research we have developed a random neural network based heuristic intrusion detection system (RNN-IDS) for IoTs. Upon feature selection, the neurons are trained and further tested at different learning rates with NSL-KDD dataset. Two methods are adopted to analyse the proposed scheme where the accuracy of RNN-IDS increased from 85.5% to 95.25%. Results also suggest that upon comparison with other machine learning algorithms, the proposed intelligent intrusion detection has higher accuracy in recognition of anomalous traffic from normal patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities. Future Gener. Comput. Syst. 78, 544–546 (2018). https://www.sciencedirect.com/science/article/pii/S0167739X17316667

    Google Scholar 

  2. Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Intelligent intrusion detection in low-power IoTs. ACM Trans. Internet Technol. 16(4), 1–25 (2016). http://dl.acm.org/citation.cfm?doid=3023158.2990499

    Google Scholar 

  3. Moustafa, N., Creech, G., Slay, J., Moustafa, N., Creech, G., Slay, J.: Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models (2017). https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/

  4. Qureshi, A.U.H., Larijani, H., Ahmad, J., Mtetwa, N.: A novel random neural network based approach for intrusion detection systems. In: 2018 IEEE 10th International Computer Science and Electronic Engineering Conference (CEEC). IEEE, September 2018

    Google Scholar 

  5. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018). https://linkinghub.elsevier.com/retrieve/pii/S1877750316305099

    Google Scholar 

  6. Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Cluster Comput. 1–13 (2017). https://doi.org/10.1007/s10586-017-1117-8

  7. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015). http://www.nature.com/articles/nature14539

    Google Scholar 

  8. Meng, F., Fu, Y., Lou, F., Chen, Z.: An effective network attack detection method based on kernel PCA and LSTM-RNN. In: 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC), pp. 568–572. IEEE, December 2017. https://ieeexplore.ieee.org/document/8447022/

  9. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. Technical report. http://nsl.cs.unb.ca/NSL-KDD/

  10. Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 92–96. IEEE, January 2015. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7058223

  11. Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21 954–21 961 (2017). http://ieeexplore.ieee.org/document/8066291/

    Google Scholar 

  12. Gelenbe, E.: Random neural networks with negative and positive signals and product form solution

    Google Scholar 

  13. Javed, A., Larijani, H., Ahmadinia, A., Emmanuel, R., Mannion, M., Gibson, D.: Design and implementation of a cloud enabled random neural network-based decentralized smart controller with intelligent sensor nodes for HVAC. IEEE Internet Things J. 4(2), 393–403 (2017). http://ieeexplore.ieee.org/document/7740096/

    Google Scholar 

  14. Javed, A., Larijani, H., Ahmadinia, A., Gibson, D.: Smart random neural network controller for HVAC using cloud computing technology. IEEE Trans. Ind. Inform. 13(1), 351–360 (2017). http://ieeexplore.ieee.org/document/7529229/

    Google Scholar 

  15. Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A.: An intelligent real-time occupancy monitoring system using single overhead camera. In: Proceedings of SAI Intelligent Systems Conference, pp. 957–969. Springer (2018)

    Google Scholar 

  16. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition, September 2014. http://arxiv.org/abs/1409.1556

  17. Khan, G.M.: Artificial Neural Network (ANNs), pp. 39–55. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-67466-7_4

  18. Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., Phillipson, M.: Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1–6. IEEE, April 2017. http://ieeexplore.ieee.org/document/7934803/

  19. NSL-KDD—Datasets—Research—Canadian Institute for Cybersecurity. http://www.unb.ca/cic/datasets/nsl.html. Accessed 03 May 2018

  20. Bajaj, K., Arora, A.: Improving the intrusion detection using discriminative machine learning approach and improve the time complexity by data mining feature selection methods. Int. J. Comput. Appl. (975–8887) 76(1) (2013). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.481.8435&rep=rep1&type=pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayyaz-ul-Haq Qureshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qureshi, AuH., Larijani, H., Ahmad, J., Mtetwa, N. (2019). A Heuristic Intrusion Detection System for Internet-of-Things (IoT). In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 997. Springer, Cham. https://doi.org/10.1007/978-3-030-22871-2_7

Download citation

Publish with us

Policies and ethics