Skip to main content

Implementing and Evaluating an Intrusion Detection System for Denial of Service Attacks in IoT Environments

  • Conference paper
  • First Online:
Advanced Intelligent Systems for Sustainable Development (AI2SD’2019) (AI2SD 2019)

Abstract

The Internet of Things (IoT) is very successful in different fields: industry, health, logistics, smart cities, smart home. Despite this success, this new technology suffers from a big security problem. Much of this problem is due to the constraints of connected objects (Memory, Processing Capabilities and limited energy …) that are the cause of various attacks, mainly denial of service attacks (DOS/DDOS). In this paper we propose the implementation and evaluation of a system of intrusion detection DOS attacks, based on the verification of the abnormal use of the energy consumption of connected objects in IoT environments. The implementation of the proposed algorithm is carried out in the Contiki-Coja environment and simulation results indicate that denial-of-service attacks can be detected with high accuracy, while keeping the number of false-positives very low.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, Leshan, China (2013)

    Google Scholar 

  2. Cisco White Paper: The Internet of Things How the Next Evolution of the Internet Is Changing Everything, April 2011

    Google Scholar 

  3. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. PP(99), 1 (2017)

    Google Scholar 

  4. Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30–37 (2013)

    Google Scholar 

  5. Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology, Gaithersburg, MD 20899-8930, February 2007

    Google Scholar 

  6. Briffaut, J.: Formalisation et garantie de propriétés de sécurité système: application à la détection d’intrusions. Autre [cs.OH]. Université d’Orléans (2007)

    Google Scholar 

  7. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)

    Google Scholar 

  8. Wagh, S.K., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16) (2013). ISSN: 0975 – 8887

    Google Scholar 

  9. Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. 2, 222–232 (1987)

    Google Scholar 

  10. Becker, J., Vester, M.: Intrusion Detection System Framework for Internet of Things. Construction of an Intrusion Detection System for Wireless Sensor Nodes with Modern Hardware. Master’s thesis in Computer Systems and Networks. Supervisor Olaf Landsiedel. Chalmers University of Technology, Gothenburg, Sweden, 120 pages (2017)

    Google Scholar 

  11. Zarpelãoa, B.B., Mianib, R.S., Kawakania, C.T., de Alvarengaa, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Google Scholar 

  12. Zlomislic, V., Fertalj, K., Sruk, V.: Denial of service attacks, defences and research challenges. Cluster Comput. 20, 661–671 (2017). https://doi.org/10.1007/s10586-017-0730-x

  13. Thingsquare. Contiki: The Open Source OS for the Internet of Things (2017). http://www.contiki-os.org/. Accessed 01 Apr 2018

  14. Cho, E., Kim, J., Hong, C.: Attack model and detection scheme for botnet on 6LoWPAN. In: Hong, C., Tonouchi, T., Ma, Y., Chao, C.-S. (eds.) Management Enabling the Future Internet for Changing Business and New Computing Services. Lecture Notes in Computer Science, vol. 5787, pp. 515–518. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  16. Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9), 1–9 (2015)

    Google Scholar 

  17. Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 141–145 (2005)

    Google Scholar 

  18. Shen, W., Han, G., Shu, L., Rodrigues, J., Chilamkurti, N.: A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks. In: Green Communications and Networking. volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 1–12. Springer, Heidelberg (2012)

    Google Scholar 

  19. Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., Hsieh, M.-C.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang, Y.-M., Chao, H.-C., Deng, D.-J., Park, J.J.J.H. (eds.) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol. 260, pp. 1205–1213. Springer, Netherlands (2014)

    Chapter  Google Scholar 

  20. Riecker, M., Biedermann, S., El Bansarkhani, R., Hollick, M.: Lightweight energy consumption-based intrusion detection system for wireless sensor networks. Int. J. Inf. Secur. 14(2), 155–167 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelouahed Bamou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bamou, A., Khardioui, M., El Ouadghiri, M.D., Aghoutane, B. (2020). Implementing and Evaluating an Intrusion Detection System for Denial of Service Attacks in IoT Environments. In: Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2019). AI2SD 2019. Lecture Notes in Networks and Systems, vol 92. Springer, Cham. https://doi.org/10.1007/978-3-030-33103-0_17

Download citation

Publish with us

Policies and ethics