Abstract
With the increasing adoption of Internet of Things (IoT) networks, ensuring their security has become a critical concern due to resource limitations and the growing complexity of malicious attacks. Intrusion Detection and Prevention Systems play a pivotal role in safeguarding network performance, but traditional methods often struggle with attack severity and classifying unknown packets. In this research, we introduce the Attention-IDS model, a comprehensive solution comprising five stages: two-fold authentication, local density-based clustering, flow-based feature extraction, intrusion detection system (IDS), and intrusion severity detection. Leveraging IoT devices and user-based authentication, our model effectively detects and prevents unauthorized access attempts, while ensuring enhanced security through the utilization of the Combine Counter Mode algorithm on the blockchain. The IDS stage, powered by the Isolation Forest algorithm, accurately classifies features as normal, malicious, or unknown. Leveraging the proposed Attention-based ResNet model, our approach intelligently classifies unknown packets into normal and malicious categories, employing feature extraction, selection, and classification. Additionally, the Extended Kalman Filter determines intrusion severity, enabling network-wide notification alarms for frequent intrusions and targeted responses for rare intrusions. Extensive simulations using the NS3.26 network simulator demonstrate the superior performance of Attention-IDS compared to existing methods.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Derhab, A., Aldweesh, A., Emam, A.Z., Khan, F.A.: Intrusion detection system for the internet of things based on temporal convolution neural network and efficient feature engineering. Wirel. Commun. Mob. Comput. 2020(6689134), 1–16 (2020)
Pirozmand, P., Ghafary, M.A., Siadat, S., Ren, J.: Intrusion detection into cloud-fog-based IoT networks using game theory. Wirel. Commun. Mob. Comput. 2020(8819545), 1–9 (2020)
Zhang, X., Yuan, Y., Zhou, Z., Li, S., Qi, L., Puthal, D.: Intrusion detection and prevention in cloud, fog, and internet of things. Secur. Commun. Netw. 2019(4529757), 1–4 (2019)
Lv, L., Wang, W., Zhang, Z., Liu, X.: A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowl. Based Syst. 195, 105648 (2020)
Das, A., Kalam, S., Sahar, N., Sinha, D.: UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Comput. Secur. 97, 101938 (2020)
Akhundov, H., Sluis, E.V., Hamdioui, S., Taouil, M.: Public-key based authentication architecture for IoT devices using PUF. ArXiv, abs/2002.01277 (2020)
Babu, M., Reddy, A.: SH-IDS: specification heuristics based intrusion detection system for IoT net-works. Wirel. Pers. Commun. 112, 2023–2045 (2020)
Ramadan, R., Yadav, K.: A novel hybrid intrusion detection system (IDS) for the detection of internet of things (IoT) network attacks. Ann. Emerg. Technol. Comput. 4, 61 (2020)
Alkhliwi, S.: Energy efficient cluster based routing protocol with secure IDS for IoT assisted heterogeneous WSN. Int. J. Adv. Comput. Sci. Appl. (2020). https://doi.org/10.14569/IJACSA.2020.0111162
EImasary, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)
Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on Pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)
Zhou, Y., Cheng, G.: An efficient network intrusion detection system based on feature selection and ensemble classifier. ArXiv, abs/1904.01352 (2020)
Verma, A., Ranga, V.: Machine learning based intrusion detection systems for IoT applications. Wirel. Person. Commun. 111, 2287–2310 (2020)
Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)
Khan, M.A., Karim, M.R., Kim, Y.: A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11, 583 (2019)
Otoum, Y., Liu, D., Nayak, A.: DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans. Emerg. Tel. Tech. (2019). https://doi.org/10.1002/ett.3803
Nguyen, M.T., Kim, K.: Genetic convolutional neural network for intrusion detection systems. Future Gener. Comput. Syst. 113, 418–427 (2020)
Ajayi, O., Saadawi, T.: Blockchain-based architecture for secured cyber-attack features exchange. 2020 7th IEEE International conference on cyber security and cloud computing (CSCloud)/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp. 100–107 (2020)
Burmaka, I., Lytvynov, V., Skiter, I., Lytvyn, S.: Evaluating a blockchain-based network performance for the intrusion detection system. Multimedia Syst. 1, 99–109 (2020)
Aldhaheri, S., Alghazzawi, D.M., Cheng, L., Alzahrani, B., Al-Barakati, A.: DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl. Sci. 10, 1909 (2020)
Abdollahi, A., Fathi, M.: An intrusion detection system on ping of death attacks in IoT networks. Wirel. Pers. Commun. 112, 2057–2070 (2020)
Chang, H., Feng, J., Duan, C.: HADIoT: a hierarchical anomaly detection framework for IoT. IEEE Access 8, 154530–154539 (2020)
Almomani, I., AlRomi, A.: Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors 20, 1375 (2020)
Abdulhammed, R., Musafer, H.A., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8, 322 (2019)
Qureshi, A., Larijani, H., Yousefi, M., Adeel, A., Mtetwa, N.: An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm. Computers 9, 58 (2020)
Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7, 6882–6897 (2020)
Dymora, P., Mazurek, M.: An innovative approach to anomaly detection in communication networks using multifractal analysis. Appl. Sci. 10, 3277 (2020)
Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manag. 16, 924–935 (2019)
Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7, 314–323 (2019)
Balakrishnan, N., Rajendran, A., Pelusi, D., Ponnusamy, V.: Deep belief network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet Things 14, 100112 (2019)
Kumar, P., Gupta, G.P., Tripathi, R.: A dis- tributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Int. Human. Comput. 12, 1–18 (2020)
Jo, W., Kim, S., Lee, C., Shon, T.: Packet preprocessing in CNN-based network intrusion detection system. Electronics 9, 1151 (2020)
Demertzis, K., Iliadis, L., Tziritas, N., Kikiras, P.: Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput. Appl. 32, 1–18 (2020)
Li, W., Wang, Y., Li, J., Au, M.: Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inform. Secur. 20(1), 13 (2020)
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019)
Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inform. Secur. 19, 279–290 (2019)
Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464–32476 (2020)
Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)
Amouri, A., Alaparthy, V., Morgera, S.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20, 461 (2020)
Tama, B.A., Comuzzi, M., Rhee, K.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497 (2019)
Liang, C., Shanmugam, B., Azam, S., Karim, A., Islam, A., Zamani, M., Kavianpour, S., Idris, N.B.: Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9, 1–27 (2020)
Acknowledgements
This research work was supported by the National Natural Science Foundation of China with No. 62027826 and 61902052, “Science and Technology Major Industrial Project of Liaoning Province” with No. 2020JH1/10100013, “Dalian Science and Technology Innovation Fund” with No. 2020JJ26GX037, and also by: The Ministry of Science and Technology, Taiwan, R.O.C. under Grant MOST 110-2221-E-182-041-MY3.
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study’s conception and design. EN performed material preparation, data collection, the first draft of manuscript writing, and data analysis. The first draft of the manuscript was verified and commented on by XL. Its improvement, supervision, and funding acquisition have been managed by WL and JC. Finally, all authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors have not disclosed any competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ntizikira, E., Wang, L., Chen, J. et al. Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04310-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04310-z