Abstract
In recent times, Internet brought revolution by connecting the whole world to share the information at one platform. Since data is the most valuable asset, every organization is putting its best effort and spending a lot of money on various security solutions like firewall, antiviruses, etc. to prevent its data and resources from unauthorised access and cyber-attacks like phishing, hacking, eavesdropping, etc. In spite of bulk of these security mechanisms, hackers are still able to exploit the vulnerabilities in the web applications to steal user’s credentials. Intrusion detection system (IDS) is proposed by researchers to detect malicious activity in the network to mitigate the cyber-attacks. In this paper, different techniques of machine learning namely K-nearest neighbor, multilayer perceptron, decision tree, Naïve Bayes and support vector machine have been evaluated for implementation of IDS to classify network connections as normal or malicious. Four measures, i.e., accuracy, sensitivity, precision and F-score, have been taken to assess ability of machine learning techniques under study. Experimental results have shown that decision tree is best classifier for IDS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Intrusion Detection System, https://searchsecurity.techtarget.com/definition/intrusion-detection-system. Accessed 1 Dec 2019
Intrusion Detection System (IDS), https://www.geeksforgeeks.org/intrusion-detection-system-ids/. Accessed 1 Dec 2019
https://krazytech.com/technical-papers/intrusion-detection-and-avoidance-system. Accessed 3 Dec 2019
https://gbhackers.com/intrusion-detection-system-ids-2/. Accessed 3 Dec 2019
https://www.quora.com/What-does-IPS-Intrusion-Prevention-System-mean. Accessed 2 Dec 2019
Patel K, Buddhadev B (2013) An architecture of hybrid intrusion detection system. Int J Inf Netw Secur 2:197–202. https://doi.org/10.11591/ijins.v2i2.1753
https://www.researchgate.net/figure/Signature-based-intrusion-detection-system_fig4_338028960. Accessed 1 Dec 2019
https://www.researchgate.net/figure/a-Anomaly-Based-Intrusion-Detection-System-b-Signature-Based-Intrusion-Detection-System_fig1_324189357. Accessed 1 Dec 2019
https://networkinterview.com/firewall-vs-ips-vs-ids/. Accessed 1 Dec 2019
Guofei G, Zhang J, Lee W (2008) BotSniffer: detecting Botnet command and control channels in network traffic. In: Proceedings of network and distributed system security symposium, NDSS, 2008
Siddiqui MK, Naahid S (2013) Analysis of kdd cup 99 dataset using clustering based data mining. Int J Database Theor Appl 6(5):23–34
Lahre K, Dhar T, Kashyap D, Aggrawal P (2013) Analyze different approaches for IDS using KDD 99 data set. Int J Recent Innov Trend Comput Commun 1(8):645–651
Ambedkar C, Kishore Babu V (2015) Detection of probe attacks using machine learning techniques. Int J Res Stud Comput Sci Eng 2(3), 25–29
I. Indre and C. Lemnaru, “Detection and prevention system against cyber attacks and botnet malware for information systems and Internet of Things”, IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 2016
Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the internet of things. In: Proceedings of living in the internet of things: cybersecurity of the IoT, 2018
Xin Y, Kong L, Liu Z, Chen Y (2018) Machine learning and deep learning methods for cyber security. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2836950
Ambedkar Ch, Kishore Babu V (2015) Detection of probe attacks using machine learning techniques. Int J Res Stud Comput Sci Eng (IJRSCSE) 2(3):25–29
Lahre K, Diwan T, Kashyap SK, Agarwal P (2013) Analyze different approaches for IDS using KDD 99 data set. Int J Recent Innov Trends Comput Commun 1(8):645–651
Zarpelao BB, Miani RS, Kawakani CT, Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84
Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp 606–611
Sharma S, Kaul A (2018) A survey on Intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET cloud. Veh Commun 12:138–164
Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. In: IEEE communications surveys & tutorials
Sharma S, Kaul A (2018) Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET. Veh Commun 12:23–38
KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 8 Dec 2019
https://www.tutorialspoint.com/machine_learning_with_python/machine_learning_with_python_knn_algorithm_finding_nearest_neighbors.htm. Accessed 8 Dec 2019
K Nearest Neighbor Algorithm, https://people.revoledu.com/kardi/tutorial/KNN/HowTo_KNN.html. Accessed 2 Dec 2019. Accessed 7 Dec 2019
https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithms-934a444fca47. Accessed Online 6 Dec 2019
Support Vector Machine, https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithms-934a444fca47. 2 Dec 2019
Multilayer Perceptron, https://www.techopedia.com/definition/20879/multilayer-perceptron-mlp. Accessed 2 Dec 2019
Decision Tree Implementation Using Python. https://www.geeksforgeeks.org/decision-tree-implementation-python/. Accessed 21 Nov 2019
https://www.datacamp.com/community/tutorials/decision-tree-classification-python. Accessed 5 Dec 2019
https://www.geeksforgeeks.org/decision-tree/. Accessed 5 Dec 2019
Naive Bayes Classifier in Python, https://dzone.com/articles/naive-bayes-tutorial-naive-bayes-classifier-in-pyt. Accessed 21 Nov 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Manhas, J., Kotwal, S. (2021). Implementation of Intrusion Detection System for Internet of Things Using Machine Learning Techniques. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-8711-5_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-8711-5_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8710-8
Online ISBN: 978-981-15-8711-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)