Skip to main content
Log in

Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the increasing adoption of Internet of Things (IoT) networks, ensuring their security has become a critical concern due to resource limitations and the growing complexity of malicious attacks. Intrusion Detection and Prevention Systems play a pivotal role in safeguarding network performance, but traditional methods often struggle with attack severity and classifying unknown packets. In this research, we introduce the Attention-IDS model, a comprehensive solution comprising five stages: two-fold authentication, local density-based clustering, flow-based feature extraction, intrusion detection system (IDS), and intrusion severity detection. Leveraging IoT devices and user-based authentication, our model effectively detects and prevents unauthorized access attempts, while ensuring enhanced security through the utilization of the Combine Counter Mode algorithm on the blockchain. The IDS stage, powered by the Isolation Forest algorithm, accurately classifies features as normal, malicious, or unknown. Leveraging the proposed Attention-based ResNet model, our approach intelligently classifies unknown packets into normal and malicious categories, employing feature extraction, selection, and classification. Additionally, the Extended Kalman Filter determines intrusion severity, enabling network-wide notification alarms for frequent intrusions and targeted responses for rare intrusions. Extensive simulations using the NS3.26 network simulator demonstrate the superior performance of Attention-IDS compared to existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Algorithm 3
Fig. 4
Algorithm 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Derhab, A., Aldweesh, A., Emam, A.Z., Khan, F.A.: Intrusion detection system for the internet of things based on temporal convolution neural network and efficient feature engineering. Wirel. Commun. Mob. Comput. 2020(6689134), 1–16 (2020)

    Article  Google Scholar 

  2. Pirozmand, P., Ghafary, M.A., Siadat, S., Ren, J.: Intrusion detection into cloud-fog-based IoT networks using game theory. Wirel. Commun. Mob. Comput. 2020(8819545), 1–9 (2020)

    Article  Google Scholar 

  3. Zhang, X., Yuan, Y., Zhou, Z., Li, S., Qi, L., Puthal, D.: Intrusion detection and prevention in cloud, fog, and internet of things. Secur. Commun. Netw. 2019(4529757), 1–4 (2019)

    Google Scholar 

  4. Lv, L., Wang, W., Zhang, Z., Liu, X.: A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowl. Based Syst. 195, 105648 (2020)

    Article  Google Scholar 

  5. Das, A., Kalam, S., Sahar, N., Sinha, D.: UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Comput. Secur. 97, 101938 (2020)

    Article  Google Scholar 

  6. Akhundov, H., Sluis, E.V., Hamdioui, S., Taouil, M.: Public-key based authentication architecture for IoT devices using PUF. ArXiv, abs/2002.01277 (2020)

  7. Babu, M., Reddy, A.: SH-IDS: specification heuristics based intrusion detection system for IoT net-works. Wirel. Pers. Commun. 112, 2023–2045 (2020)

    Article  Google Scholar 

  8. Ramadan, R., Yadav, K.: A novel hybrid intrusion detection system (IDS) for the detection of internet of things (IoT) network attacks. Ann. Emerg. Technol. Comput. 4, 61 (2020)

    Article  Google Scholar 

  9. Alkhliwi, S.: Energy efficient cluster based routing protocol with secure IDS for IoT assisted heterogeneous WSN. Int. J. Adv. Comput. Sci. Appl. (2020). https://doi.org/10.14569/IJACSA.2020.0111162

    Article  Google Scholar 

  10. EImasary, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)

    Article  Google Scholar 

  11. Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on Pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)

    Article  Google Scholar 

  12. Zhou, Y., Cheng, G.: An efficient network intrusion detection system based on feature selection and ensemble classifier. ArXiv, abs/1904.01352 (2020)

  13. Verma, A., Ranga, V.: Machine learning based intrusion detection systems for IoT applications. Wirel. Person. Commun. 111, 2287–2310 (2020)

    Article  Google Scholar 

  14. Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)

    Article  Google Scholar 

  15. Khan, M.A., Karim, M.R., Kim, Y.: A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11, 583 (2019)

    Article  Google Scholar 

  16. Otoum, Y., Liu, D., Nayak, A.: DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans. Emerg. Tel. Tech. (2019). https://doi.org/10.1002/ett.3803

    Article  Google Scholar 

  17. Nguyen, M.T., Kim, K.: Genetic convolutional neural network for intrusion detection systems. Future Gener. Comput. Syst. 113, 418–427 (2020)

    Article  Google Scholar 

  18. Ajayi, O., Saadawi, T.: Blockchain-based architecture for secured cyber-attack features exchange. 2020 7th IEEE International conference on cyber security and cloud computing (CSCloud)/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp. 100–107 (2020)

  19. Burmaka, I., Lytvynov, V., Skiter, I., Lytvyn, S.: Evaluating a blockchain-based network performance for the intrusion detection system. Multimedia Syst. 1, 99–109 (2020)

    Google Scholar 

  20. Aldhaheri, S., Alghazzawi, D.M., Cheng, L., Alzahrani, B., Al-Barakati, A.: DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl. Sci. 10, 1909 (2020)

    Article  Google Scholar 

  21. Abdollahi, A., Fathi, M.: An intrusion detection system on ping of death attacks in IoT networks. Wirel. Pers. Commun. 112, 2057–2070 (2020)

    Article  Google Scholar 

  22. Chang, H., Feng, J., Duan, C.: HADIoT: a hierarchical anomaly detection framework for IoT. IEEE Access 8, 154530–154539 (2020)

    Article  Google Scholar 

  23. Almomani, I., AlRomi, A.: Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors 20, 1375 (2020)

    Article  Google Scholar 

  24. Abdulhammed, R., Musafer, H.A., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8, 322 (2019)

    Article  Google Scholar 

  25. Qureshi, A., Larijani, H., Yousefi, M., Adeel, A., Mtetwa, N.: An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm. Computers 9, 58 (2020)

    Article  Google Scholar 

  26. Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7, 6882–6897 (2020)

    Article  Google Scholar 

  27. Dymora, P., Mazurek, M.: An innovative approach to anomaly detection in communication networks using multifractal analysis. Appl. Sci. 10, 3277 (2020)

    Article  Google Scholar 

  28. Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manag. 16, 924–935 (2019)

    Article  Google Scholar 

  29. Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7, 314–323 (2019)

    Article  Google Scholar 

  30. Balakrishnan, N., Rajendran, A., Pelusi, D., Ponnusamy, V.: Deep belief network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet Things 14, 100112 (2019)

    Article  Google Scholar 

  31. Kumar, P., Gupta, G.P., Tripathi, R.: A dis- tributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Int. Human. Comput. 12, 1–18 (2020)

    Google Scholar 

  32. Jo, W., Kim, S., Lee, C., Shon, T.: Packet preprocessing in CNN-based network intrusion detection system. Electronics 9, 1151 (2020)

    Article  Google Scholar 

  33. Demertzis, K., Iliadis, L., Tziritas, N., Kikiras, P.: Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput. Appl. 32, 1–18 (2020)

    Article  Google Scholar 

  34. Li, W., Wang, Y., Li, J., Au, M.: Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inform. Secur. 20(1), 13 (2020)

    Google Scholar 

  35. Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019)

    Article  Google Scholar 

  36. Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inform. Secur. 19, 279–290 (2019)

    Article  Google Scholar 

  37. Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464–32476 (2020)

    Article  Google Scholar 

  38. Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  39. Amouri, A., Alaparthy, V., Morgera, S.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20, 461 (2020)

    Article  Google Scholar 

  40. Tama, B.A., Comuzzi, M., Rhee, K.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497 (2019)

    Article  Google Scholar 

  41. Liang, C., Shanmugam, B., Azam, S., Karim, A., Islam, A., Zamani, M., Kavianpour, S., Idris, N.B.: Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9, 1–27 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This research work was supported by the National Natural Science Foundation of China with No. 62027826 and 61902052, “Science and Technology Major Industrial Project of Liaoning Province” with No. 2020JH1/10100013, “Dalian Science and Technology Innovation Fund” with No. 2020JJ26GX037, and also by: The Ministry of Science and Technology, Taiwan, R.O.C. under Grant MOST 110-2221-E-182-041-MY3.

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study’s conception and design. EN performed material preparation, data collection, the first draft of manuscript writing, and data analysis. The first draft of the manuscript was verified and commented on by XL. Its improvement, supervision, and funding acquisition have been managed by WL and JC. Finally, all authors read and approved the final manuscript.

Corresponding author

Correspondence to Ernest Ntizikira.

Ethics declarations

Competing interests

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ntizikira, E., Wang, L., Chen, J. et al. Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04310-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04310-z

Keywords

Navigation