Abstract
Internet of Things (IoT) have demonstrated significant impact on all aspects of human daily lives due to their pervasive applications in areas such as telehealth, home appliances, surveillance, and wearable devices. The number of IoT devices and sensors connected to the Internet across the world is expected to reach over 50 billion by the end of 2020. The connection of such rapidly increasing number of IoT devices to the Internet leads to concerns in cyber-attacks such as malware, worms, denial of service attack (DoS) and distributed DoS attack (DDoS). To prevent these attacks from compromising the performance of IoT devices, various approaches for detecting and mitigating cyber security threats have been developed. This paper reports an IoT attack and anomaly detection approach by using the dendritic cell algorithm (DCA). In particular, DCA is an artificial immune system (AIS), which is developed from the inspiration of the working principles and characteristic behaviours of the human immune system (HIS), specifically for the purpose of detecting anomalies in networked systems. The performance of the DCA on detecting IoT attacks is evaluated using publicly available IoT datasets, including DoS, DDoS, Reconnaissance, Keylogging, and Data exfiltration. The experimental results show that, the DCA achieved a comparable detection performance to some of the commonly used classifiers, such as decision trees, random forests, support vector machines, artificial neural network and naïve Bayes, but with reasonably high computational efficiency.
This work has been supported by the Commonwealth Scholarship Commission (CSC-TZCS-2017-717), the Royal Academy of Engineering (IAPP1\(\setminus \)100077), and Mr. Aminu Abulmalik who contributed to data processing and part of the experimentation under the Royal Academy of Engineering project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)
Ray, P.P.: A survey on internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
Oracevic, A., Dilek, S., Ozdemir, S.: Security in internet of things: a survey. In: 2017 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2017)
Yang, L., Elisa, N., Eliot, N.: Privacy and security aspects of e-government in smart cities. In: Smart Cities Cybersecurity and Privacy, pp. 89–102. Elsevier (2019)
Naik, N., Jenkins, P., Kerby, B., Sloane, J., Yang, L.: Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls. In: 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–8 (2018)
Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: International Conference on Artificial Immune Systems, pp. 153–167. Springer, Heidelberg (2005)
Engelbrecht, A.P., Cleghorn, C.W.: Recent advances in particle swarm optimization analysis and understanding. In: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, pp. 747–774 (2020)
Elisa, N., Yang, L., Chao, F., Naik, N.: A comparative study of genetic algorithm and particle swarm optimisation for dendritic cell algorithm. In: 2020 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8 (2020)
Elisa, N., Yang, L., Naik, N.: Dendritic cell algorithm with optimised parameters using genetic algorithm. In: 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2018)
Matzinger, P.: Essay 1: the danger model in its historical context. Scand. J. Immunol. 54(1–2), 4–9 (2001)
Chelly, Z., Elouedi, Z.: A survey of the dendritic cell algorithm. Knowl. Inf. Syst. 48(3), 505–535 (2016)
Elisa, N., Yang, L., Qu, Y., Chao, F.: A revised dendritic cell algorithm using k-means clustering. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1547–1554. IEEE (2018)
Gu, F.: Theoretical and empirical extensions of the dendritic cell algorithm. PhD thesis, University of Nottingham (2011)
Chelly, Z., Elouedi, Z.: Hybridization schemes of the fuzzy dendritic cell immune binary classifier based on different fuzzy clustering techniques. New Gener. Comput. 33(1), 1–31 (2015)
Elisa, N., Yang, L., Chao, F.: Signal categorisation for dendritic cell algorithm using GA with partial shuffle mutation. In: UK Workshop on Computational Intelligence, pp. 529–540. Springer, Cham (2019)
Yang, L., Chao, F., Shen, Q.: Generalised adaptive fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 25(4), 839–853 (2017)
Yang, L., Shen, Q.: Closed form fuzzy interpolation. Fuzzy Sets and Syst. 225, 1–22 (2013)
Elisa, N., Li, J., Zuo, Z., Yang, L.: Dendritic cell algorithm with fuzzy inference system for input signal generation. In: UK Workshop on Computational Intelligence, pp. 203–214. Springer, Cham (2018)
Witten, I.H., Frank, E., Hall, M.A., Pal, C.J.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, Burlington (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Elisa, N., Yang, L., Chao, F., Naik, N. (2021). Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_81
Download citation
DOI: https://doi.org/10.1007/978-3-030-73689-7_81
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73688-0
Online ISBN: 978-3-030-73689-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)