Skip to main content

Advertisement

Log in

Evaluation of contemporary intrusion detection systems for internet of things environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) involves wide-ranging devices connected through the Internet with an aim to enable coherent communication amongst them without human intervention to realize profuse smart applications which inherently makes our life a lot easier and furthermore productive. These connected devices continuously sense and gather information from surroundings, thereby producing an immense amount of data that cater for big data analytics. In the current era, number of smart devices are increasing rapidly due to the magnificent features they offer. Moreover, public access to the Internet makes the system even more vulnerable to intrusions. Catastrophically, this has fascinated numerous cybercriminals who have turned the IoT ecosystem into a hotbed of illicit activities. Thereupon, implication of Intrusion Detection System (IDS) in IoT is apparent. The literature suggests a number of IDS to address intrusions/attacks in the discipline of IoT. In the current paper, besides Systematic Literature Review of the IDS for IoT environment, a deep learning model with aquila optimization is proposed to predict anomaly using IoTID20, UNSW-NB15–1 and UNSW_2018_IoT_Botnet_Full5pc_4 datasets. The hybrid model that we have developed, uses a combined network structure of convolutional neural network and aquila optimization algorithm. In all of the studies that were carried out, the swarm intelligence-driven deep learning strategy outperformed other, comparable approaches. Based on current findings, it is reasonable to draw the conclusion that the suggested technique offers an efficient method for early anomaly detection and contributes to viable control of anomaly in the IoT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

Data availability

All data generated or analyzed during this study are included in this published article.

References

  1. Abualigah L, Diabat A, Geem ZW (2020) A comprehensive survey of the harmony search algorithm in clustering applications. Appl Sci 10(11):3827

    Google Scholar 

  2. Albawi S, Mohammed TAM, Alzawi S (2017) Layers of a Convolutional Neural Network. Icet2017, 1–6

  3. Al-Haija AQ, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11(4):1–19

    Google Scholar 

  4. Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Damaševičius R, Bahaj SA (2022) Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3):494

    Google Scholar 

  5. Alkahtani H, Aldhyani TH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:1–18

    Google Scholar 

  6. Alsulami AA, Abu Al-Haija Q, Tayeb A, Alqahtani A (2022) An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering. Appl Sci 12(23):12336

    Google Scholar 

  7. Amin SO, Siddiqui MS, Hong CS, Choe J (2009) A novel coding scheme to implement signature-based IDS in IP based Sensor Networks. IFIP/IEEE International Symposium on Integrated Network Management-Workshops: 269–274

  8. Anitha AA, Arockiam L (2021) Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things. Int J Adv Comput Sci Appl 12(11)

  9. Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Commun Surv Tutor 20(4):3496–3509

    Google Scholar 

  10. Bhor HN, Kalla M (2020) An Intrusion Detection in Internet of Things: A Systematic Study. International Conference on Smart Electronics and Communication, 939–944

  11. Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71

    Google Scholar 

  12. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701

    Google Scholar 

  13. Creech G, Hu J (2013) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63(4):807–819

    MathSciNet  Google Scholar 

  14. Dat-Thinh N, Xuan-Ninh H, Kim-Hung L (2022) MidSiot: a multistage intrusion detection system for internet of things. Wirel Commun Mob Comput 2022:1–15

    Google Scholar 

  15. Disha RA, Waheed S (2022) Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 5(1):1–22

    Google Scholar 

  16. Fenanir S, Semchedine F, Harous S, Baadache A (2020) A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT. Ing des Syst d’Information 25(5): 569–577

  17. Garcia Ribera E, Martinez Alvarez B, Samuel C, Ioulianou PP, Vassilakis VG (2022) An Intrusion Detection System for RPL-Based IoT Networks. Electronics 11(23), 4041:1–27

  18. Gassais R, Ezzati-Jivan N, Fernandez JM, Aloise D, Dagenais MR (2020) Multi-level host-based intrusion detection system for Internet of things. J Cloud Comput 9:1–16

    Google Scholar 

  19. Gyamfi E, Jurcut A (2022) Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 22(10):3744

    Google Scholar 

  20. Hajiheidari S, Wakil K, Badri M, Navimipour NJ (2019) Intrusion detection systems in the Internet of things: A comprehensive investigation. Comput Netw 160:165–191

    Google Scholar 

  21. Hindy H, Brosset D, Bayne E, Seeam AK, Tachtatzis C, Atkinson R, Bellekens X (2020) A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8:104650–104675

    Google Scholar 

  22. Javed SH, Ahmad MB, Asif M, Almotiri SH, Masood K, Ghamdi MAA (2022) An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT). Electronics 11(5):742

    Google Scholar 

  23. Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1–27

    Google Scholar 

  24. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210

    Google Scholar 

  25. Koroniotis N (2020) Designing an effective network forensic framework for the investigation of botnets in the Internet of Things (Doctoral dissertation, UNSW Sydney)

  26. Koroniotis N, Moustafa N (2020). Enhancing network forensics with particle swarm and deep learning: The particle deep framework. arXiv preprint arXiv:2005.00722

  27. Koroniotis N, Moustafa N, Sitnikova E, Slay J (2018) Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In Mobile Networks and Management: 9th International Conference, MONAMI Melbourne, Australia, 30–44

  28. Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur Gener Comput Syst 100:779–796

    Google Scholar 

  29. Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Futur Gener Comput Syst 110:91–106

    Google Scholar 

  30. Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802–209834

    Google Scholar 

  31. Krishna E, Arunkumar T (2021) Hybrid particle swarm and gray wolf optimization algorithm for IoT intrusion detection system. Int J Intell Eng Syst 14(4):66–76

    Google Scholar 

  32. Laith A, Dalia Y, Abd EM, Ewees Ahmed A, Al-qaness Mohammed AA, Gandomi Amir H (2021) Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput Ind Eng 157:107250

    Google Scholar 

  33. Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25

    Google Scholar 

  34. Le KH, Nguyen MH, Tran TD, Tran ND (2022) IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics 11(4):524

    Google Scholar 

  35. Maciá-Pérez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martínez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2010) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732

    Google Scholar 

  36. Min E, Long J, Liu Q, Cui J, Chen W (2018) TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur Commun Netw 2018:1–9

    Google Scholar 

  37. Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military communications and information systems conference, 1–6

  38. Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J: A Global Perspective 25(1–3):18–31

    Google Scholar 

  39. Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481–494

    Google Scholar 

  40. Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications 127–156

  41. Qaddoura R, Al-Zoubi A M, Faris H, Almomani I (2021) A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors 21(9):2987

    Google Scholar 

  42. Ramadan RA, Yadav K (2020) A novel hybrid intrusion detection system (IDS) for the detection of internet of things (IoT) network attacks. Ann Emerg Technol Comput (AETiC) 4(5):61–74

    Google Scholar 

  43. Saghezchi FB, Mantas G, Violas MA, de Oliveira Duarte AM, Rodriguez J (2022) Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 11(4):602

    Google Scholar 

  44. Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J, Elsevier 61(12):9395–9409

  45. Salcedo-Sanz S (2016) Modern meta-heuristics based on nonlinear physics processes: A review of models and design procedures. Phys Rep 655:1–70

    MathSciNet  Google Scholar 

  46. Sandhya E, Kumarappan A (2021) Enhancing the Performance of an Intrusion Detection System Using Spider Monkey Optimization in IoT. Int J Intell Eng Syst 14(6):30–39

    Google Scholar 

  47. Sarhan M, Layeghy S, Moustafa N, Portmann M (2021) Netflow datasets for machine learning-based network intrusion detection systems. Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, 117–135

  48. Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. IEEE International Conference on Communications (ICC), p 1–6

  49. Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S (2002) Specification-based anomaly detection: a new approach for detecting network intrusions. ACM conference on Computer and communications security, 265–274

  50. Sicato JCS, Singh SK, Rathore S, Park JH (2020) A comprehensive analyses of intrusion detection system for IoT environment. J Inf Process Syst 16(4):975–990

    Google Scholar 

  51. Song Y, Hyun S, Cheong YG (2021) Analysis of autoencoders for network intrusion detection. Sensors 21(13):4294

    Google Scholar 

  52. Spadaccino P, Cuomo F (2020) Intrusion detection systems for iot: opportunities and challenges offered by edge computing. arXiv preprint arXiv:2012.01174

  53. Syamsuddin I, Barukab OM (2022) SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks. Electronics 11(5):737

    Google Scholar 

  54. Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial Internet of Things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1–8

    Google Scholar 

  55. Ullah I, Mahmoud HQ (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks, Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI, Lecture Notes in Computer Science

  56. Ullah I, Mahmoud QH (2020) A scheme for generating a dataset for anomalous activity detection in iot networks. Advances in Artificial Intelligence: 33rd Canadian Conference on Artificial Intelligence, 08–520

  57. Wang J, Kuang Q, Duan S (2015) A new online anomaly learning and detection for large-scale service of internet of thing. Pers Ubiquit Comput 19:1021–1031

    Google Scholar 

  58. Wani A, Khaliq R (2021) SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans Intell Technol 6(3):281–290

    Google Scholar 

  59. Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37

    Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Vandana Choudhary or Sarvesh Tanwar.

Ethics declarations

Conflict of interest

The authors declare that they do not have any conflict of interests that influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choudhary, V., Tanwar, S. & Choudhury, T. Evaluation of contemporary intrusion detection systems for internet of things environment. Multimed Tools Appl 83, 7541–7581 (2024). https://doi.org/10.1007/s11042-023-15918-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15918-5

Keywords

Navigation