Skip to main content

Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques

  • Chapter
  • First Online:

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

In recent times, Internet brought revolution by connecting the whole world to share the information at one platform. Since data is the most valuable asset, every organization is putting its best effort and spending a lot of money on various security solutions like firewall, antiviruses, etc. to prevent its data and resources from unauthorised access and cyber-attacks like phishing, hacking, eavesdropping, etc. In spite of bulk of these security mechanisms, hackers are still able to exploit the vulnerabilities in the web applications to steal user’s credentials. Intrusion detection system (IDS) is proposed by researchers to detect malicious activity in the network to mitigate the cyber-attacks. In this paper, different techniques of machine learning namely K-nearest neighbor, multilayer perceptron, decision tree, Naïve Bayes and support vector machine have been evaluated for implementation of IDS to classify network connections as normal or malicious. Four measures, i.e., accuracy, sensitivity, precision and F-score, have been taken to assess ability of machine learning techniques under study. Experimental results have shown that decision tree is best classifier for IDS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Intrusion Detection System, https://searchsecurity.techtarget.com/definition/intrusion-detection-system. Accessed 1 Dec 2019

  2. Intrusion Detection System (IDS), https://www.geeksforgeeks.org/intrusion-detection-system-ids/. Accessed 1 Dec 2019

  3. https://krazytech.com/technical-papers/intrusion-detection-and-avoidance-system. Accessed 3 Dec 2019

  4. https://gbhackers.com/intrusion-detection-system-ids-2/. Accessed 3 Dec 2019

  5. https://www.quora.com/What-does-IPS-Intrusion-Prevention-System-mean. Accessed 2 Dec 2019

  6. Patel K, Buddhadev B (2013) An architecture of hybrid intrusion detection system. Int J Inf Netw Secur 2:197–202. https://doi.org/10.11591/ijins.v2i2.1753

  7. https://www.researchgate.net/figure/Signature-based-intrusion-detection-system_fig4_338028960. Accessed 1 Dec 2019

  8. https://www.researchgate.net/figure/a-Anomaly-Based-Intrusion-Detection-System-b-Signature-Based-Intrusion-Detection-System_fig1_324189357. Accessed 1 Dec 2019

  9. https://networkinterview.com/firewall-vs-ips-vs-ids/. Accessed 1 Dec 2019

  10. Guofei G, Zhang J, Lee W (2008) BotSniffer: detecting Botnet command and control channels in network traffic. In: Proceedings of network and distributed system security symposium, NDSS, 2008

    Google Scholar 

  11. Siddiqui MK, Naahid S (2013) Analysis of kdd cup 99 dataset using clustering based data mining. Int J Database Theor Appl 6(5):23–34

    Article  Google Scholar 

  12. Lahre K, Dhar T, Kashyap D, Aggrawal P (2013) Analyze different approaches for IDS using KDD 99 data set. Int J Recent Innov Trend Comput Commun 1(8):645–651

    Google Scholar 

  13. Ambedkar C, Kishore Babu V (2015) Detection of probe attacks using machine learning techniques. Int J Res Stud Comput Sci Eng 2(3), 25–29

    Google Scholar 

  14. I. Indre and C. Lemnaru, “Detection and prevention system against cyber attacks and botnet malware for information systems and Internet of Things”, IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 2016

    Google Scholar 

  15. Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the internet of things. In: Proceedings of living in the internet of things: cybersecurity of the IoT, 2018

    Google Scholar 

  16. Xin Y, Kong L, Liu Z, Chen Y (2018) Machine learning and deep learning methods for cyber security. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2836950

    Article  Google Scholar 

  17. Ambedkar Ch, Kishore Babu V (2015) Detection of probe attacks using machine learning techniques. Int J Res Stud Comput Sci Eng (IJRSCSE) 2(3):25–29

    Google Scholar 

  18. Lahre K, Diwan T, Kashyap SK, Agarwal P (2013) Analyze different approaches for IDS using KDD 99 data set. Int J Recent Innov Trends Comput Commun 1(8):645–651

    Google Scholar 

  19. Zarpelao BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84

    Google Scholar 

  20. Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp 606–611

    Google Scholar 

  21. Sharma S, Kaul A (2018) A survey on Intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET cloud. Veh Commun 12:138–164

    Google Scholar 

  22. Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. In: IEEE communications surveys & tutorials

    Google Scholar 

  23. Sharma S, Kaul A (2018) Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET. Veh Commun 12:23–38

    Google Scholar 

  24. KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 8 Dec 2019

  25. https://www.tutorialspoint.com/machine_learning_with_python/machine_learning_with_python_knn_algorithm_finding_nearest_neighbors.htm. Accessed 8 Dec 2019

  26. K Nearest Neighbor Algorithm, https://people.revoledu.com/kardi/tutorial/KNN/HowTo_KNN.html. Accessed 2 Dec 2019. Accessed 7 Dec 2019

  27. https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithms-934a444fca47. Accessed Online 6 Dec 2019

  28. Support Vector Machine, https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithms-934a444fca47. 2 Dec 2019

  29. Multilayer Perceptron, https://www.techopedia.com/definition/20879/multilayer-perceptron-mlp. Accessed 2 Dec 2019

  30. Decision Tree Implementation Using Python. https://www.geeksforgeeks.org/decision-tree-implementation-python/. Accessed 21 Nov 2019

  31. https://www.datacamp.com/community/tutorials/decision-tree-classification-python. Accessed 5 Dec 2019

  32. https://www.geeksforgeeks.org/decision-tree/. Accessed 5 Dec 2019

  33. Naive Bayes Classifier in Python, https://dzone.com/articles/naive-bayes-tutorial-naive-bayes-classifier-in-pyt. Accessed 21 Nov 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jatinder Manhas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Manhas, J., Kotwal, S. (2021). Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_11

Download citation

Publish with us

Policies and ethics