Skip to main content

Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System

  • 372 Accesses

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1383)

Abstract

Internet of Things (IoT) have demonstrated significant impact on all aspects of human daily lives due to their pervasive applications in areas such as telehealth, home appliances, surveillance, and wearable devices. The number of IoT devices and sensors connected to the Internet across the world is expected to reach over 50 billion by the end of 2020. The connection of such rapidly increasing number of IoT devices to the Internet leads to concerns in cyber-attacks such as malware, worms, denial of service attack (DoS) and distributed DoS attack (DDoS). To prevent these attacks from compromising the performance of IoT devices, various approaches for detecting and mitigating cyber security threats have been developed. This paper reports an IoT attack and anomaly detection approach by using the dendritic cell algorithm (DCA). In particular, DCA is an artificial immune system (AIS), which is developed from the inspiration of the working principles and characteristic behaviours of the human immune system (HIS), specifically for the purpose of detecting anomalies in networked systems. The performance of the DCA on detecting IoT attacks is evaluated using publicly available IoT datasets, including DoS, DDoS, Reconnaissance, Keylogging, and Data exfiltration. The experimental results show that, the DCA achieved a comparable detection performance to some of the commonly used classifiers, such as decision trees, random forests, support vector machines, artificial neural network and naïve Bayes, but with reasonably high computational efficiency.

Keywords

  • IoT
  • Dendritic cell algorithm
  • Anomaly detection
  • Artificial immune systems
  • Cyber-attacks

This work has been supported by the Commonwealth Scholarship Commission (CSC-TZCS-2017-717), the Royal Academy of Engineering (IAPP1\(\setminus \)100077), and Mr. Aminu Abulmalik who contributed to data processing and part of the experimentation under the Royal Academy of Engineering project.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-73689-7_81
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-73689-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

References

  1. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Google Scholar 

  2. Ray, P.P.: A survey on internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)

    Google Scholar 

  3. Oracevic, A., Dilek, S., Ozdemir, S.: Security in internet of things: a survey. In: 2017 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2017)

    Google Scholar 

  4. Yang, L., Elisa, N., Eliot, N.: Privacy and security aspects of e-government in smart cities. In: Smart Cities Cybersecurity and Privacy, pp. 89–102. Elsevier (2019)

    Google Scholar 

  5. Naik, N., Jenkins, P., Kerby, B., Sloane, J., Yang, L.: Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls. In: 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–8 (2018)

    Google Scholar 

  6. Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)

    CrossRef  Google Scholar 

  7. Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: International Conference on Artificial Immune Systems, pp. 153–167. Springer, Heidelberg (2005)

    Google Scholar 

  8. Engelbrecht, A.P., Cleghorn, C.W.: Recent advances in particle swarm optimization analysis and understanding. In: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, pp. 747–774 (2020)

    Google Scholar 

  9. Elisa, N., Yang, L., Chao, F., Naik, N.: A comparative study of genetic algorithm and particle swarm optimisation for dendritic cell algorithm. In: 2020 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8 (2020)

    Google Scholar 

  10. Elisa, N., Yang, L., Naik, N.: Dendritic cell algorithm with optimised parameters using genetic algorithm. In: 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2018)

    Google Scholar 

  11. Matzinger, P.: Essay 1: the danger model in its historical context. Scand. J. Immunol. 54(1–2), 4–9 (2001)

    CrossRef  Google Scholar 

  12. Chelly, Z., Elouedi, Z.: A survey of the dendritic cell algorithm. Knowl. Inf. Syst. 48(3), 505–535 (2016)

    CrossRef  Google Scholar 

  13. Elisa, N., Yang, L., Qu, Y., Chao, F.: A revised dendritic cell algorithm using k-means clustering. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1547–1554. IEEE (2018)

    Google Scholar 

  14. Gu, F.: Theoretical and empirical extensions of the dendritic cell algorithm. PhD thesis, University of Nottingham (2011)

    Google Scholar 

  15. Chelly, Z., Elouedi, Z.: Hybridization schemes of the fuzzy dendritic cell immune binary classifier based on different fuzzy clustering techniques. New Gener. Comput. 33(1), 1–31 (2015)

    CrossRef  Google Scholar 

  16. Elisa, N., Yang, L., Chao, F.: Signal categorisation for dendritic cell algorithm using GA with partial shuffle mutation. In: UK Workshop on Computational Intelligence, pp. 529–540. Springer, Cham (2019)

    Google Scholar 

  17. Yang, L., Chao, F., Shen, Q.: Generalised adaptive fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 25(4), 839–853 (2017)

    CrossRef  Google Scholar 

  18. Yang, L., Shen, Q.: Closed form fuzzy interpolation. Fuzzy Sets and Syst. 225, 1–22 (2013)

    MathSciNet  CrossRef  Google Scholar 

  19. Elisa, N., Li, J., Zuo, Z., Yang, L.: Dendritic cell algorithm with fuzzy inference system for input signal generation. In: UK Workshop on Computational Intelligence, pp. 203–214. Springer, Cham (2018)

    Google Scholar 

  20. Witten, I.H., Frank, E., Hall, M.A., Pal, C.J.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, Burlington (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Longzhi Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Elisa, N., Yang, L., Chao, F., Naik, N. (2021). Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune System. In: , et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_81

Download citation