Advertisement

Cluster Computing

, Volume 22, Supplement 4, pp 9889–9904 | Cite as

Mobile network intrusion detection for IoT system based on transfer learning algorithm

  • Lianbing Deng
  • Daming LiEmail author
  • Xiang Yao
  • David Cox
  • Haoxiang Wang
Article

Abstract

The open deployment environment and limited resources of the Internet of things (IoT) make it vulnerable to malicious attacks, while the traditional intrusion detection system is difficult to meet the heterogeneous and distributed features of the Internet of things. The security and privacy protection of IoT is directly related to the practical application of IoT. In this paper, We analyze the characteristics of networking security and security problems, and discuss the system framework of Internet security and some key security technologies, including key management, authentication and access control, routing security, privacy protection, intrusion detection and fault tolerance and intrusion etc. This paper introduces the current problems of IoT in network security, and points out the necessity of intrusion detection. Several kinds of intrusion detection technologies are discussed, and its application on IoT architecture is analyzed. We compare the application of different intrusion detection technologies, and make a prospect of the next phase of research. Using data mining and machine learning methods to study network intrusion technology has become a hot issue. A single class feature or a detection model is very difficult to improve the detection rate of network intrusion detection. The performance of the proposed model is validated through the public databases.

Keywords

Intrusion detection Internet of things Information security Pop learning 

Notes

Acknowledgements

This paper is supported by the The Project of Macau Foundation (No. M1617): The First-phase Construction of Big-Data on Smart Macao.

References

  1. 1.
    Zhou, J.: Wireless sensor network intrusion detection model research. In: CIE 16th Information Theory Academic Conference Proceedings, pp. 799–804. Electronic Industry Press, Beijing (2009)Google Scholar
  2. 2.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)CrossRefGoogle Scholar
  3. 3.
    Xinghua, L., Xiaojun, Z.: Multi person cross region loss prevention method in personnel image tracking process. Comput. Simul. 31(9), 243–246 (2014)Google Scholar
  4. 4.
    Tao, Y., Hu, B., Gao, X., Hou, X.: Research on dynamic tracking compensation method of hyperspectral interference imaging. Acta Photon. Sin. 45(7), 716–723 (2016)Google Scholar
  5. 5.
    Xinghua, L., et al.: Research on software design of smart home control system based on Android. Internet Things Technol. 35(5), 692–695 (2015)Google Scholar
  6. 6.
    Kun, Z., Meng, X.: Research and prevention measures of computer network security. Fujian 10, 102–103 (2009)Google Scholar
  7. 7.
    United States General Accounting Office: Computer Attacks at Department of Defense Pose Increasing Risks. GAO/AIMD-96-84 Defense Information Security, Washington DC (1996)Google Scholar
  8. 8.
    United States General Accounting Office: Opportunities for improved OMB over sight of agency practices. GAO/AIMD Information Security, Washington DC (1996)Google Scholar
  9. 9.
    Conti, J.P.: The Internet of things. Commun. Eng. 4(6), 20–25 (2006)CrossRefGoogle Scholar
  10. 10.
    ITU: The Internet of Things. [EB/OL] (2005-12-17) [2010-07-03]. http://www.itu.int/internet of things
  11. 11.
    Xiaon, W.A.N.G., Guiying, W.E.I.: Cipher algorithm in data transmission of RFID system on the Internet for things. J. Beijing Inf. Sci. Technol. Univ. 24(4), 25–78 (2009)Google Scholar
  12. 12.
    Weber, R.H.: Internet of things—new security and privacy challenges. Comput. Law Security Rev. 26, 23–30 (2010)CrossRefGoogle Scholar
  13. 13.
    Leusse, P., Periorellis, P., Dimitrakos, T., Nair, S.K.: Self managed security cell a security model for the Internet of things and services. In: Proceedings of the First International Conference on Advances in Future Internet, pp. 47–52. IEEE Computer Society, Washington DC (2009)Google Scholar
  14. 14.
    Mulligan, G.: The Internet of things: here now and coming soon. Internet Comput. 1, 36–37 (2010)Google Scholar
  15. 15.
    Zheng, S.Q., Han, Y.J., Zhang, Q.: Architecture and application of IOT. Softw. Ind. Eng. 6(6), 27–31 (2010)Google Scholar
  16. 16.
    Wu, C.K.: Initially search on security architecture of IoT. Proc. Inf. Security 25(4), 411–419 (2010)Google Scholar
  17. 17.
    Zhu, J.M., Ma, J.F.: An intrusion detection data collection model based on multi-agents. Comput. Appl. Res. 1, 103–105 (2004)Google Scholar
  18. 18.
    Zhao, P., Wang, F., Xiao, X.C.: An intrusion detection technology based on multi-agents and its realization. Comput. Eng. Sci. 23(6), 39–42 (2001)Google Scholar
  19. 19.
    Liu, W.T.: Network intrusion detection based on improved genetic algorithm. J. Chongqing Univ. Commerce (Nat. Sci.) 27(5), 476–480 (2010)Google Scholar
  20. 20.
    Luo, H.W.: Network intrusion detection system and performance indicators. Telecommun. Netw. Technol. 11, 24–26 (2005)Google Scholar
  21. 21.
    Mukkamala, S., Sung, A.H.: Identifying significant features for network forensic analysis using artificial intelligent techniques. Int. J. Digit. Evid. 1(4), 1–17 (2003)Google Scholar
  22. 22.
    Lei, Y., Huan, L.: Feature selection for high dimensional data: a fast correlation based filter solution. In: Proceedings of 20th International Conference on Machine LearningGoogle Scholar
  23. 23.
    Yu, L., Liu, H.: Feature selection for high-dimensional data: a fast correlation-based filter solution. In: Proceedings of the 20th International Conference on Machine Learning, pp. 856–863. Morgan Kaufmann, San Francisco (2003)Google Scholar
  24. 24.
    Mac, Q.J.B.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281–297. University of California Press, Berkeley (1967)Google Scholar
  25. 25.
    Martin, G., Smart, N.P.: Distributing the key distribution centre in Sakai-Kasahara based systems. In: Parker, M.G. (ed.) Cryptography and Coding. LNCS, vol. 5921, pp. 252–262. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  26. 26.
    Ozdem, I.R.S.: Secure and reliable data aggregation for wireless sensor networks. In: Ichikawa, H. et al. (eds.) UCS 2007. LNCS, vol. 4836, pp. 102–109. Springer, Berlin (2007)Google Scholar
  27. 27.
    Wood, A.D., Fang, L., Stankovic, J.A.: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks, pp. 35–48. ACM, New York (2006)Google Scholar
  28. 28.
    Liu, D., Ning, P.: Multi level TESLA: a broadcast authentication system for distributed sensor net works. ACM Trans. Embed. Comput. Syst. (TECS) 3(4), 800–836 (2004)MathSciNetCrossRefGoogle Scholar
  29. 29.
    Hettich, S., Bay, S.D.: KDD cup 1999 data [EB/OL]. http://kdd.ics.uci.edu/databases/kdd- cup99/kddcup99.html. Accessed 23 Sept 2014

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Lianbing Deng
    • 1
    • 2
  • Daming Li
    • 3
    • 4
    • 5
    Email author
  • Xiang Yao
    • 2
  • David Cox
    • 6
  • Haoxiang Wang
    • 7
    • 8
  1. 1.Huazhong University of Science and TechnologyWuhanChina
  2. 2.Zhuhai Da Hengqin Science and Technology Development Co., Ltd.HengqinChina
  3. 3.The Post-Doctoral Research Center of Zhuhai Da Hengqin Science and Technology Development Co., Ltd.HengqinChina
  4. 4.City University of MacauTaipaMacau
  5. 5.International Postdoctoral Science and Technology Research Institute Co., LtdWuhanChina
  6. 6.Harvard John A. Paulson School of Engineering & Applied SciencesHarvard UniversityCambridgeUSA
  7. 7.Cornell UniversityIthacaUSA
  8. 8.GoPerception LaboratoryNew YorkUSA

Personalised recommendations