Loading…

MidSiot: A Multistage Intrusion Detection System for Internet of Things

Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding envir...

Full description

Saved in:
Bibliographic Details
Published in:Wireless communications and mobile computing 2022-02, Vol.2022, p.1-15
Main Authors: Dat-Thinh, Nguyen, Xuan-Ninh, Ho, Kim-Hung, Le
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283
cites cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283
container_end_page 15
container_issue
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2022
creator Dat-Thinh, Nguyen
Xuan-Ninh, Ho
Kim-Hung, Le
description Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.
doi_str_mv 10.1155/2022/9173291
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2636153424</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2636153424</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxYMoWKs3P0DAo67N382ut1K1Flo8tJ5Dmk1qSrupSRbptzdLxaMwzDyYHzO8B8AtRo8Ycz4iiJBRjQUlNT4DA8wpKqpSiPM_XdaX4CrGLUKIIoIHYLpwzdL59ATHcNHtkotJbQyctSl00fkWPptkdOrV8hiT2UPrQ782oTUJegtXn67dxGtwYdUumpvfOQQfry-ryVsxf5_OJuN5oSkVqWiEUFZYXBtGdF01gnONFGoUJZZrRrChuXKrKVFcMS1wqddlVTK2poRUdAjuTncPwX91Jia59V1o80tJSlpmm4ywTD2cKB18jMFYeQhur8JRYiT7qGQflfyNKuP3JzxbadS3-5_-AaeCZsE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2636153424</pqid></control><display><type>article</type><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><source>Wiley Online Library</source><source>Publicly Available Content Database</source><creator>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le</creator><contributor>Nassar, Hamed ; Hamed Nassar</contributor><creatorcontrib>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le ; Nassar, Hamed ; Hamed Nassar</creatorcontrib><description>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/9173291</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accuracy ; Algorithms ; Collaboration ; Communications traffic ; Computer networks ; Cybersecurity ; Data collection ; Datasets ; Denial of service attacks ; Gateways ; Heterogeneity ; Industrial applications ; Internet of Things ; Internet service providers ; Intrusion detection systems ; Machine learning ; Malware ; Neural networks</subject><ispartof>Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-15</ispartof><rights>Copyright © 2022 Nguyen Dat-Thinh et al.</rights><rights>Copyright © 2022 Nguyen Dat-Thinh et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</citedby><cites>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</cites><orcidid>0000-0001-5092-2386 ; 0000-0002-2781-8043 ; 0000-0001-8321-7886</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2636153424/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2636153424?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,75126</link.rule.ids></links><search><contributor>Nassar, Hamed</contributor><contributor>Hamed Nassar</contributor><creatorcontrib>Dat-Thinh, Nguyen</creatorcontrib><creatorcontrib>Xuan-Ninh, Ho</creatorcontrib><creatorcontrib>Kim-Hung, Le</creatorcontrib><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><title>Wireless communications and mobile computing</title><description>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Collaboration</subject><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Data collection</subject><subject>Datasets</subject><subject>Denial of service attacks</subject><subject>Gateways</subject><subject>Heterogeneity</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Internet service providers</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Neural networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kE9LAzEQxYMoWKs3P0DAo67N382ut1K1Flo8tJ5Dmk1qSrupSRbptzdLxaMwzDyYHzO8B8AtRo8Ycz4iiJBRjQUlNT4DA8wpKqpSiPM_XdaX4CrGLUKIIoIHYLpwzdL59ATHcNHtkotJbQyctSl00fkWPptkdOrV8hiT2UPrQ782oTUJegtXn67dxGtwYdUumpvfOQQfry-ryVsxf5_OJuN5oSkVqWiEUFZYXBtGdF01gnONFGoUJZZrRrChuXKrKVFcMS1wqddlVTK2poRUdAjuTncPwX91Jia59V1o80tJSlpmm4ywTD2cKB18jMFYeQhur8JRYiT7qGQflfyNKuP3JzxbadS3-5_-AaeCZsE</recordid><startdate>20220221</startdate><enddate>20220221</enddate><creator>Dat-Thinh, Nguyen</creator><creator>Xuan-Ninh, Ho</creator><creator>Kim-Hung, Le</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-5092-2386</orcidid><orcidid>https://orcid.org/0000-0002-2781-8043</orcidid><orcidid>https://orcid.org/0000-0001-8321-7886</orcidid></search><sort><creationdate>20220221</creationdate><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><author>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Collaboration</topic><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Data collection</topic><topic>Datasets</topic><topic>Denial of service attacks</topic><topic>Gateways</topic><topic>Heterogeneity</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Internet service providers</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Neural networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dat-Thinh, Nguyen</creatorcontrib><creatorcontrib>Xuan-Ninh, Ho</creatorcontrib><creatorcontrib>Kim-Hung, Le</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dat-Thinh, Nguyen</au><au>Xuan-Ninh, Ho</au><au>Kim-Hung, Le</au><au>Nassar, Hamed</au><au>Hamed Nassar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>MidSiot: A Multistage Intrusion Detection System for Internet of Things</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-02-21</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/9173291</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-5092-2386</orcidid><orcidid>https://orcid.org/0000-0002-2781-8043</orcidid><orcidid>https://orcid.org/0000-0001-8321-7886</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-15
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2636153424
source Wiley Online Library; Publicly Available Content Database
subjects Accuracy
Algorithms
Collaboration
Communications traffic
Computer networks
Cybersecurity
Data collection
Datasets
Denial of service attacks
Gateways
Heterogeneity
Industrial applications
Internet of Things
Internet service providers
Intrusion detection systems
Machine learning
Malware
Neural networks
title MidSiot: A Multistage Intrusion Detection System for Internet of Things
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T05%3A13%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=MidSiot:%20A%20Multistage%20Intrusion%20Detection%20System%20for%20Internet%20of%20Things&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Dat-Thinh,%20Nguyen&rft.date=2022-02-21&rft.volume=2022&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/9173291&rft_dat=%3Cproquest_cross%3E2636153424%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2636153424&rft_id=info:pmid/&rfr_iscdi=true