Skip to main content

Advertisement

Log in

Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Security represents one of the main critical issues in the Internet of Things (IoT), especially the routing attacks in the core network where the loss of information becomes very harmful. This paper proposes a novel scheme called deep learning-based early stage detection (DL-ESD) using IoT routing attack dataset (IRAD), including hello flood (HF), decreased rank (DR), and version number (VN) to enhance the detection capability of routing attacks. The experiments have been performed in three phases: (i) features extraction using linear discriminant analysis (LDA), which aims to generate features more distinguishable from each other, (ii) the features normalization using min–max scaling to eliminate the worst overfittings to the existence of fewer data points in training samples, and (iii) selection the substantial features. The binary classification methods have been employed to measure the proposed model’s training efficiency. We have performed the training stage on deep learning techniques such as logistic regression (LR), K-nearest neighbors (KNN), support vector machine (SVM), naïve Bayes (NB), and multilayer perceptron (MLP). The comparison results illustrate that the proposed MLP classifier has a high training accuracy and the best runtime rate. Consequently, the proposed scheme achieved prediction accuracy reaching 98.85%, precision of 97.50%, recall rate 98.33%, and 97.01% F1 score rate with better performance than state-of-the-art studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Internet routing attacks data used in this study is available at link: https://www.github.com/iot-attacks/irad.

References

  1. Chen S, Xu H, Liu D et al (2014) A vision of IoT: applications, challenges, and opportunities with China perspective. IEEE Internet Things J 1:349–359. https://doi.org/10.1109/JIOT.2014.2337336

    Article  Google Scholar 

  2. Ye J, Cheng X, Zhu J et al (2018) A DDoS attack detection method based on SVM in software defined network. Secur Commun Netw. https://doi.org/10.1155/2018/9804061

    Article  Google Scholar 

  3. Li Y, Zuo Y, Song H et al (2021) Deep learning in security of Internet of Things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3106898

    Article  Google Scholar 

  4. Liu D, Yan Z, Ding W et al (2019) A survey on secure data analytics in edge computing. IEEE Internet Things J 6:4946–4967. https://doi.org/10.1109/JIOT.2019.2897619

    Article  Google Scholar 

  5. Mahmoud R, Yousuf T, Aloul F et al (2016) Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th Int Conf Internet Technol Secur Trans ICITST 2015, pp 336–41. https://doi.org/10.1109/ICITST.2015.7412116

  6. Mazhar MS, Saleem Y, Almogren A et al (2022) Forensic analysis on Internet of Things (IoT) device using machine-to-machine (M2M) framework. Electron 11:1126. https://doi.org/10.3390/ELECTRONICS11071126

    Article  Google Scholar 

  7. Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3:854–864. https://doi.org/10.1109/JIOT.2016.2584538

    Article  Google Scholar 

  8. Srivastava A, Gupta BB, Tyagi A et al (2011) A recent survey on DDoS attacks and defense mechanisms. Commun Comput Inf Sci (CCIS) 203:570–580. https://doi.org/10.1007/978-3-642-24037-9_57

    Article  Google Scholar 

  9. Chang TY, Hsieh CJ (2018) Detection and analysis of distributed denial-of-service in internet of things-employing artificial neural network and apache spark platform. Sens Mater 30:857–867. https://doi.org/10.18494/SAM.2018.1789

    Article  Google Scholar 

  10. Almusaylim ZA, Jhanjhi NZ, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors (Switzerland) 20:1–25. https://doi.org/10.3390/s20215997

    Article  Google Scholar 

  11. Musaddiq A, Zikria YB, Zulqarnain et al (2020) Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw 2020:1–23. https://doi.org/10.1186/S13638-020-1645-4/TABLES/11

    Article  Google Scholar 

  12. Butun I, Osterberg P, Song H (2020) Security of the Internet of Things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutorials 22:616–644. https://doi.org/10.1109/COMST.2019.2953364

    Article  Google Scholar 

  13. Harbi Y, Aliouat Z, Refoufi A et al (2021) Recent security trends in internet of things: a comprehensive survey. IEEE Access 9:113292–113314. https://doi.org/10.1109/ACCESS.2021.3103725

    Article  Google Scholar 

  14. Raoof A, Matrawy A, Lung CH (2019) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutorials 21:1582–1606. https://doi.org/10.1109/COMST.2018.2885894

    Article  Google Scholar 

  15. Kim J, Kim J, Thu HLT et al (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 Int Conf Platf Technol Serv PlatCon 2016—Proc Published Online First: 19 April 2016. https://doi.org/10.1109/PLATCON.2016.7456805

  16. Saeed A, Ahmadinia A, Javed A et al (2016) Intelligent intrusion detection in low-power IoTs. ACM Trans Internet Technol. https://doi.org/10.1145/2990499

    Article  Google Scholar 

  17. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768. https://doi.org/10.1016/j.future.2017.08.043

    Article  Google Scholar 

  18. Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for Internet of Things using deep learning. IEEE Access 8:74571–74585. https://doi.org/10.1109/ACCESS.2020.2988854

    Article  Google Scholar 

  19. Kamel SOM (2020) Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network. IJCNIS. https://doi.org/10.5815/ijcnis.2020.04.02

    Article  Google Scholar 

  20. Nayak S, Ahmed N, Misra S (2021) Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw 123:1570–8705. https://doi.org/10.1016/J.ADHOC.2021.102661

    Article  Google Scholar 

  21. Qureshi KN, Rana SS, Ahmed A et al (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc 61:102343. https://doi.org/10.1016/J.SCS.2020.102343

    Article  Google Scholar 

  22. Qasem ZAH, Esmaiel H, Sun H et al (2019) Enhanced fully generalized spatial modulation for the internet of underwater things. Sensors (Switzerland) 19:1–16. https://doi.org/10.3390/s19071519

    Article  Google Scholar 

  23. Thamilarasu G, Chawla S (2019) Towards deep-learning-driven intrusion detection for the internet of things. Sensors (Switzerland). https://doi.org/10.3390/s19091977

    Article  Google Scholar 

  24. Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58. https://doi.org/10.2991/ijcis.2018.25905181

    Article  Google Scholar 

  25. Seth AD, Biswas S, Dhar AK (2020) Detection and verification of decreased rank attack using round-trip times in RPL-based 6LoWPAN networks. In: Int Symp Adv Networks Telecommun Syst ANTS 2020, December 2020, pp 3–8. https://doi.org/10.1109/ANTS50601.2020.9342754

  26. Sharma S, Kumar VV (2021) AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. J Supercomput. https://doi.org/10.1007/s11227-021-03833-1

    Article  Google Scholar 

  27. Prakash PJ, Lalitha B, Prakash PJ et al (2022) Optimized ensemble classifier based network intrusion detection system for RPL based Internet of Things keywords Internet of Things · RPL based IoT · Intrusion detection system · Voting ensemble classifier · Feature selection. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09726-7

    Article  Google Scholar 

  28. Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778–4812. https://doi.org/10.1007/s11227-020-03471-z

    Article  Google Scholar 

  29. Osman M, He J, Mahiuob F et al (2021) Artificial neural network model for decreased rank attack detection in RPL based on IoT networks. Int J Netw Secur. https://doi.org/10.6633/IJNS.202105

    Article  Google Scholar 

  30. Manne VRJ, Sreekanth S (2022) Detection and mitigation of RPL routing attacks in Internet of Things. In: Proc 2022 9th Int Conf Comput Sustain Glob Dev INDIACom 2022 2022, pp 481–5. https://doi.org/10.23919/INDIACOM54597.2022.9763140

  31. Zannone N, Alaa Al-Amiedy T, Anbar M et al (2022) A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things. Sensors. https://doi.org/10.3390/s22093400

    Article  Google Scholar 

  32. Palattella MR, Accettura N, Vilajosana X et al (2013) Standardized protocol stack for the internet of (important) things. IEEE Commun Surv Tutorials 15:1389–1406. https://doi.org/10.1109/SURV.2012.111412.00158

    Article  Google Scholar 

  33. Agiollo A, Conti M, Member S et al (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18:1178–1190

    Article  Google Scholar 

  34. Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manag 14:472–486. https://doi.org/10.1109/TNSM.2017.2705290

    Article  Google Scholar 

  35. Llns I (2021) A holistic framework for prediction of routing attacks. J Supercomput. https://doi.org/10.1007/s11227-021-03922-1

    Article  Google Scholar 

  36. Sarhan M, Layeghy S, Moustafa N et al (2021) Feature extraction for machine learning-based intrusion detection in IoT networks. http://arxiv.org/abs/2108.12722

  37. Moustafa N, Member S, Slay J et al (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2017.2715166

    Article  Google Scholar 

  38. Ghaleb B, Al-Dubai AY, Ekonomou E et al (2019) A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Commun Surv Tutorials 21:1607–1635. https://doi.org/10.1109/COMST.2018.2874356

    Article  Google Scholar 

  39. Roy D, Murty KSR, Mohan CK (2015) Feature selection using Deep Neural Networks. In: Proc Int Jt Conf Neural Networks 2015, 2015 September. https://doi.org/10.1109/IJCNN.2015.7280626

  40. Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection R. Pattern Recognit Lett 51:1–7

    Article  Google Scholar 

  41. Singh K, Dhindsa KS, Nehra D (2020) T-CAD: a threshold based collaborative DDoS attack detection in multiple autonomous systems. J Inf Secur Appl 51:102457. https://doi.org/10.1016/j.jisa.2020.102457

    Article  Google Scholar 

  42. Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: Int Conf Signal Process Commun Eng Syst—Proc SPACES 2015, Assoc with IEEE 2015, pp 92–6. https://doi.org/10.1109/SPACES.2015.7058223

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of China under Grant Nos: 61572095 and 61877007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingchu Li.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Albishari, M., Li, M., Zhang, R. et al. Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks. J Supercomput 79, 2626–2653 (2023). https://doi.org/10.1007/s11227-022-04753-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04753-4

Keywords

Navigation