Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja
DOI:
https://doi.org/10.4108/eetiot.v7i28.324Keywords:
IoT security, Attacks, Machine Learning-based approaches, Decision tree-based models, Cooja simulatorAbstract
Once hardware becomes "intelligent", it is vulnerable to threats. Therefore, IoT ecosystems are susceptible to a variety of attacks and are considered challenging due to heterogeneity and dynamic ecosystem. In this study, we proposed a method for detecting IoT attacks that are based on ML-based approaches that release the final decision to detect IoT attacks. However, we have implemented three attacks as a sample in the IoT via Contiki OS to generate a real dataset of IoT-based features containing a mix of data from malicious nodes and normal nodes in the IoT network to be utilized in the ML-based models. As a result, the multiclass random decision forest ML-based model achieved 98.9% overall accuracy in detecting IoT attacks for the real novel dataset compared to the decision tree jungle, decision forest tree regression, and boosted decision tree regression, which achieved 87.7%, 93.2%, and 87.1%, respectively. Thus, the decision tree-based approach efficiently manipulates and analyzes the KoÜ-6LoWPAN-IoT dataset, generated via the Cooja simulator, to detect inconsistent behavior and classify malicious activities.
Downloads
References
K. Wu, R. A. Laghari, M. Ali, and A. Ayub Khan. "A Review and State of Art of Internet of Things (IoT)." Archives of Computational Methods in Engineering, pp. 1-19,2021. DOI: https://doi.org/10.1007/s11831-021-09622-6
I. Lee, and K. Lee. "The Internet of Things (IoT): Applications, investments, and challenges for enterprises." Business horizons, pp. 431-440, 2015. DOI: https://doi.org/10.1016/j.bushor.2015.03.008
C. Bayılmış, M. A. Ebleme, Ü. Çavuşoğlu, K. Küçük, A. Sevin, A survey on communication protocols and performance evaluations for Internet of Things, Digital Communications and Networks, 2022, https://doi.org/10.1016/j.dcan.2022.03.013. DOI: https://doi.org/10.1016/j.dcan.2022.03.013
T. Pflanzner, A. Kertesz. "A taxonomy and survey of IoT cloud applications." EAI Endorsed Transactions on Internet of Things: Terjedelem-14. 2018. DOI: https://doi.org/10.4108/eai.6-4-2018.154391
C. Bayilmis, K. Kucuk, Internet of Things: Theory and Applications, Daisy Science Publishing (2019).
M. S. Mekala and P. Viswanathan, "A Survey: Smart agriculture IoT with cloud computing," 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), pp. 1-7, 2017. DOI: https://doi.org/10.1109/ICMDCS.2017.8211551
L. Minh Dang, M. Jalil Piran, D. Han, K. Min and H. Moon "A survey on internet of things and cloud computing for healthcare." Electronics, 2019. DOI: https://doi.org/10.3390/electronics8070768
A. A. Laghari, H. He, A. Khan, N. Kumar and R. Kharel, "Quality of Experience Framework for Cloud Computing (QoC)," in IEEE Access, vol. 6, pp. 64876-64890, 2018. DOI: https://doi.org/10.1109/ACCESS.2018.2865967
R. Sikarwar, P. Yadav and A. Dubey, "A Survey on IOT enabled cloud platforms," 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 120-124, 2020. DOI: https://doi.org/10.1109/CSNT48778.2020.9115735
Ping, H., Wang, J., Ma, Z., & Du, Y. "Mini-review of application of IoT technology in monitoring agricultural products quality and safety". Int. Journal of Agricultural and Biological Engineering, 11(5), pp. 35-45. 2018. DOI: https://doi.org/10.25165/j.ijabe.20181105.3092
F. T. Johnsen et al., "Application of IoT in military operations in a smart city," 2018 International Conference on Military Communications and Information Systems (ICMCIS), 2018, pp. 1-8. DOI: https://doi.org/10.1109/ICMCIS.2018.8398690
K. Riad, T. Huang, L. Ke."A dynamic and hierarchical access control for IoT in multi-authority cloud storage." Journal of Network and Computer Applications. pp. 102633. 2020. DOI: https://doi.org/10.1016/j.jnca.2020.102633
N. M. Abdulkareem,S. R. M. Zeebaree,M. A. M.Sadeeq, D. M. Ahmed,A. S. Sami,R. R. Zebari,"IoT and Cloud computing issues, challenges and opportunities: A review." Qubahan Academic Journal, pp.1-7. 2021. DOI: https://doi.org/10.48161/qaj.v1n2a36
A. Ramakrishnan, D. Preuveneersa, Y. Berbersa,"Enabling self-learning in dynamic and open IoT environments." Procedia Computer Science, pp. 207-214. 2014. DOI: https://doi.org/10.1016/j.procs.2014.05.416
D. Choudhary "Security Challenges and Countermeasures for the Heterogeneity of IoT Applications." Journal of Autonomous Intelligence, pp. 16-22. 2019. DOI: https://doi.org/10.32629/jai.v1i2.25
Y. Hajjaji, A. Boulilaac, I. R. Faraha, I. Romdhanib, A.Hussain, "Big data and IoT-based applications in smart environments: A systematic review." Computer Science Review, pp. 100318. 2021. DOI: https://doi.org/10.1016/j.cosrev.2020.100318
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications." IEEE communications surveys & tutorials, pp. 2347-2376,2015. DOI: https://doi.org/10.1109/COMST.2015.2444095
A. Verma and V. Ranga, "Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review," in IEEE Sensors Journal, vol. 20, no. 11, pp. 5666-5690, 1 June1, 2020. DOI: https://doi.org/10.1109/JSEN.2020.2973677
A. Rghioui, M. Bouhorma and A. Benslimane, "Analytical study of security aspects in 6LoWPAN networks," 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 2013, pp. 1-5. DOI: https://doi.org/10.1109/ICT4M.2013.6518912
L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, "IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?," in IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018. DOI: https://doi.org/10.1109/MSP.2018.2825478
M. Injadat, A. Moubayed and A. Shami, "Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach," 2020 32nd International Conference on Microelectronics (ICM), 2020, pp. 1-4. DOI: https://doi.org/10.1109/ICM50269.2020.9331794
R. Barker, "Security aspects in 6lowPan networks," 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), 2010, pp. 660-660. DOI: https://doi.org/10.1109/DATE.2010.5457120
M. Seliem and K. Elgazzar, “IoTeWay: A Secure Framework Architecture for 6LoWPAN Based IoT Applications,” Conf. on IEEE, Egypt, Jan. 2019. DOI: https://doi.org/10.1109/GCIoT.2018.8620137
E. Kim, D. Kaspar, JP. Vasseur, "Design and application spaces for IPv6 over low-power wireless personal area networks (6LoWPANs)." RFC6568 (2012). DOI: https://doi.org/10.17487/rfc6568
Osorio, O. Gracia, B. S. Reyes Daza, and O. J. Salcedo Parra. "Comparative Study of Performance for 804.15. 4 ZigBee and 6LoWPAN Protocols." SOFSEM (Student Research Forum Papers/Posters). Vol. 1548. 2016.
Tanveer, Muhammad, et al. "S6AE: Securing 6LoWPAN using authenticated encryption scheme." Sensors, 2020. DOI: https://doi.org/10.3390/s20092707
P. P. Ioulianou and V. G. Vassilakis, "Denial-of-service attacks and countermeasures in the RPL-based Internet of Things." Computer Security. Springer, Cham,374-390, 2019. DOI: https://doi.org/10.1007/978-3-030-42048-2_24
R. Dobbins, D. Migault, R. Moskowitz, N. Teague, L. Xia, and K. Nishizuka, “Use Cases for DDoS Open Threat Signalling,” RFC 8903, 2021. [Online]. Available: https://www.rfc-editor.org/info/rfc8903. DOI: https://doi.org/10.17487/RFC8903
N. Abughazaleh, R. Bin, M. Btish, and H. M., “DoS Attacks in IoT Systems and Proposed Solutions,” IJCA, vol. 176, no. 33, pp. 16–19, Jun. 2020. DOI: https://doi.org/10.5120/ijca2020920397
V. Neerugatti and A. R. M. Reddy, "Detection and prevention of black hole attack in RPL protocol based on the threshold value of nodes in the internet of things networks." Int. J. Innov. Technol. Explor. Eng 8.9 ,2018. DOI: https://doi.org/10.35940/ijitee.I3060.0789S319
S. Ali, M. A. Khan, J. Ahmad, A. W. Malik, and A. U. Rehman, "Detection and prevention of Black Hole Attacks in IoT & WSN," 3rd Inter. Conf. on FMEC, Spain, pp. 217–226, May 2018. DOI: https://doi.org/10.1109/FMEC.2018.8364068
F. Ahmed and Y. B. Ko, “Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks,” Security and Commun. Net., vol. 9, no. 18, pp. 5143–5154, Dec. 2016. DOI: https://doi.org/10.1002/sec.1684
A. H. Farea and K. Küçük, "Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja", International Journal of Multidisciplinary Studies and Innovative Technologies, vol. 5, no. 2, pp. 123-128, Nov. 2021.
C. V. L. Mendoza and J. H. Kleinschmidt, “Mitigating on-off attacks in the internet of things using a distributed trust management scheme,” IJDSN, vol. 2015, 2015. DOI: https://doi.org/10.1155/2015/859731
A. A. Wardana, “IoT Object Security towards On-off Attack Using Trustworthiness Management,” 8th inter. Conf. on ICoICT, Indonesia, 2020.
M. Hasan, M. Milon Islam, M. Zarif, and M. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” IoT, vol. 7, Sep. 2019. DOI: https://doi.org/10.1016/j.iot.2019.100059
P.Bedia, S. Mewadab, R. Arjunarao, V. Chaitanya, S. Kanwalvir, S. Dhindsae, M. Ponnusamyf, R. Sikarwarg, “Detection of attacks in IoT sensors networks using machine learning algorithm,” Microprocessors and Microsystems, vol. 82, Apr. 2021. DOI: https://doi.org/10.1016/j.micpro.2020.103814
M. Waqas, K. Kumar, A. Laghari,U. Saeed,M. Rind. "Botnet attack detection in Internet of Things devices over cloud environment via machine learning." Concurrency and Computation: Practice and Experience 34, no. 4, 2022. DOI: https://doi.org/10.1002/cpe.6662
https://www.kaggle.com/datasets/francoisxa/ds2ostraffictraces
https://www.unb.ca/cic/datasets/index.html
https://research.unsw.edu.au/projects/unsw-nb15-dataset
https://research.unsw.edu.au/projects/bot-iot-dataset
I. A. Ismaili, A. Azyat, N.Raissouni, N. B. Achhab, A. Chahboun M. Lahraoua "Comparative study of ZigBee and 6LoWPAN protocols." ICCWCS 2019: Third International Conference on Computing and Wireless Communication Systems, April 24-25 , 2019.
M.V.R Jyothisree and S.Sreekanth “Attacks in RPL and Detection Technique used for Internet of Things.” Inter. Jou. Recent Techno. and Eng., vol. 8, 2019, ISSN: 2277-3878.
“Contiki 6LoWPAN Quick Guide Contiki on STM32 Nucleo plugged with Sub-1 GHz RF expansion board (X-NUCLEO-IDS01A4, X-NUCLEO-IDS01A5).”, Apr. 2016. [Online]. Available: https://github.com/contiki-os/Contiki
C. Hennebert and J. dos Santos, “Security Protocols and Privacy Issues into 6LoW-PAN Stack: A Synthesis,” IEEE Internet of things journal, vol. 1, no. 5, pp. 384–398, 2014. DOI: https://doi.org/10.1109/JIOT.2014.2359538
Y. Chen, J. Chanet, K. Hou, Y. Chen, J.-P. Chanet, and K. Mean HOU, “RPL Routing Protocol a case study: Precision agriculture,” CF-WoFUCT 2012, Feb. 2012. [Online] Available: https://hal.archives-ouvertes.fr/hal-00681319
A. S. J. Charles and P. Kalavathi, “QoS Measurement of RPL using Cooja Simulator and Wireshark Network Analyser View project QoS Measurement of RPL using Cooja Simulator and Wireshark Network Analyser,” IJCSE, vol. 6, 2018, ISSN: 2347-2693.
A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, “Powertrace: Network-level Power Profiling for Low-power Wireless Networks,” SICS Technical Report, T2011, Mar. 2011, ISSN 1100-3154.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.