Skip to main content

Abstract

This research paper is focused on security in IoT devices network, by providing a visual tool based on Beta Hebbian Learning (BHL) to easily identify attacks in the network to human experts. Contrary to Artificial Intelligent-driven solutions based on supervised learning BHL does not require labelled information. A testing environment of IoT devices and web clients is created and attack by using a Sybil Attack type, recording all traffic information in separating the fields of the captures by the most relevant, these fields are taken from “Wireshark Display Filter Reference” tool. Results obtained by BHL algorithm provide clear projections where most of the attacks can be easily identified by human expert through visual inspection in real time, proving a powerful tool to be easily implemented in IoT environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juniper research: IoT platform revenue to grow 20% in 2020, despite global covid-19 pandemic (2020). https://www.juniperresearch.com/press/press-releases/iot-platform-revenue-to-grow20-in-2020

  2. Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017). https://doi.org/10.1109/EECSI.2017.8239179

  3. Aveleira-mata, J., et al.: Prototipo de ids para detección de intrusiones con modelos de machine learning en sistemas IoT de la industria 4.0 ids prototype for intrusion detection with machine learning models in IoT systems of the industry 4.0. Dyna 96, 1–11 (2021)

    Google Scholar 

  4. Berro, A., Larabi Marie-Sainte, S., Ruiz-Gazen, A.: Genetic algorithms and particle swarm optimization for exploratory projection pursuit. Ann. Math. Artif. Intell. 60, 153–178 (2010). https://doi.org/10.1007/s10472-010-9211-0

    Article  MathSciNet  MATH  Google Scholar 

  5. Corchado, E., Fyfe, C.: Connectionist techniques for the identification and suppression of interfering underlying factors. IJPRAI 17, 1447–1466 (2003). https://doi.org/10.1142/S0218001403002915

    Article  Google Scholar 

  6. Crespo-Turrado, C., et al.: Comparative study of imputation algorithms applied to the prediction of student performance. Log. J. IGPL 28(1), 58–70 (2020)

    Article  MathSciNet  Google Scholar 

  7. Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37. IEEE (2017)

    Google Scholar 

  8. García-Ordás, M.T., Aveleira-Mata, J., Casteleiro-Roca, J.-L., Calvo-Rolle, J.L., Benavides-Cuellar, C., Alaiz-Moretón, H.: Autoencoder latent space influence on IoT MQTT attack classification. In: Analide, C., Novais, P., Camacho, D., Yin, H. (eds.) IDEAL 2020. LNCS, vol. 12490, pp. 279–286. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-62365-4_27

    Chapter  Google Scholar 

  9. Jove, E., Casteleiro-Roca, J., Quintián, H., Méndez-Pérez, J., Calvo-Rolle, J.: Anomaly detection based on intelligent techniques over a bicomponent production plant used on wind generator blades manufacturing. Rev. Iberoamericana Autom. Inform. Ind. 17(1), 84–93 (2020)

    Article  Google Scholar 

  10. Jove, E., et al.: Missing data imputation over academic records of electrical engineering students. Log. J. IGPL 28(4), 487–501 (2020)

    Article  MathSciNet  Google Scholar 

  11. Jove, E., et al.: Modelling the hypnotic patient response in general anaesthesia using intelligent models. Log. J. IGPL 27(2), 189–201 (2019)

    Article  MathSciNet  Google Scholar 

  12. Kant, D., Johannsen, A., Creutzburg, R.: Analysis of IoT security risks based on the exposure of the MQTT protocol. IEEE Access 3(6), 1–8 (2021)

    Google Scholar 

  13. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  14. Luis Casteleiro-Roca, J., Quintián, H., Luis Calvo-Rolle, J., Méndez-Pérez, J.A., Javier Perez-Castelo, F., Corchado, E.: Lithium iron phosphate power cell fault detection system based on hybrid intelligent system. Log. J. IGPL 28(1), 71–82 (2020)

    Article  MathSciNet  Google Scholar 

  15. Magán-Carrión, R., Urda, D., Díaz-Cano, I., Dorronsoro, B.: Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Appl. Sci. 10(5), 1775 (2020)

    Article  Google Scholar 

  16. Quintián, H., Corchado, E.: Beta hebbian learning as a new method for exploratory projection pursuit. Int. J. Neural Syst. 27(6), 1–16 (2017). https://doi.org/10.1142/S0129065717500241

    Article  Google Scholar 

  17. Quintián, H., et al.: Beta-hebbian learning for visualizing intrusions in flows. In: Herrero, Álvaro., Cambra, Carlos, Urda, Daniel, Sedano, Javier, Quintián, Héctor., Corchado, Emilio (eds.) CISIS 2019. AISC, vol. 1267, pp. 446–459. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-57805-3_42

    Chapter  Google Scholar 

  18. Sánchez, R., Herrero, Á., Corchado, E.: Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data. Log. J. IGPL 25(1), 83–102 (2017). https://doi.org/10.1093/jigpal/jzw047

    Article  MathSciNet  Google Scholar 

  19. Sedano, J., González, S., Chira, C., Herrero, Á., Corchado, E., Villar, J.R.: Key features for the characterization of android malware families. Log. J. IGPL 25(1), 54–66 (2017). https://doi.org/10.1093/jigpal/jzw046

    Article  MathSciNet  Google Scholar 

  20. Singh, R.P., Javaid, M., Haleem, A., Suman, R.: Internet of things (IoT) applications to fight against COVID-19 pandemic. Diabetes Metab. Syndr.: Clin. Res. Rev. 14(4), 521–524 (2020)

    Article  Google Scholar 

  21. Umair, M., Cheema, M., Cheema, O., Li, H., Lu, H.: Impact of COVID-19 on IoT adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT (2021)

    Google Scholar 

  22. Vega, R.V., Quintián, H., Calvo-Rolle, J.L., Herrero, Á., Corchado, E.: Gaining deep knowledge of android malware families through dimensionality reduction techniques. Log. J. IGPL 27(2), 160–176 (2019). https://doi.org/10.1093/jigpal/jzy030

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

Spanish National Cybersecurity Institute (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Héctor Quintián .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Grandío, Á.M. et al. (2022). Beta Hebbian Learning for Intrusion Detection in Networks of IoT Devices. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_3

Download citation

Publish with us

Policies and ethics