Loading…
MidSiot: A Multistage Intrusion Detection System for Internet of Things
Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding envir...
Saved in:
Published in: | Wireless communications and mobile computing 2022-02, Vol.2022, p.1-15 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283 |
---|---|
cites | cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283 |
container_end_page | 15 |
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Dat-Thinh, Nguyen Xuan-Ninh, Ho Kim-Hung, Le |
description | Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks. |
doi_str_mv | 10.1155/2022/9173291 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2636153424</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2636153424</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxYMoWKs3P0DAo67N382ut1K1Flo8tJ5Dmk1qSrupSRbptzdLxaMwzDyYHzO8B8AtRo8Ycz4iiJBRjQUlNT4DA8wpKqpSiPM_XdaX4CrGLUKIIoIHYLpwzdL59ATHcNHtkotJbQyctSl00fkWPptkdOrV8hiT2UPrQ782oTUJegtXn67dxGtwYdUumpvfOQQfry-ryVsxf5_OJuN5oSkVqWiEUFZYXBtGdF01gnONFGoUJZZrRrChuXKrKVFcMS1wqddlVTK2poRUdAjuTncPwX91Jia59V1o80tJSlpmm4ywTD2cKB18jMFYeQhur8JRYiT7qGQflfyNKuP3JzxbadS3-5_-AaeCZsE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2636153424</pqid></control><display><type>article</type><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><source>Wiley Online Library</source><source>Publicly Available Content Database</source><creator>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le</creator><contributor>Nassar, Hamed ; Hamed Nassar</contributor><creatorcontrib>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le ; Nassar, Hamed ; Hamed Nassar</creatorcontrib><description>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/9173291</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accuracy ; Algorithms ; Collaboration ; Communications traffic ; Computer networks ; Cybersecurity ; Data collection ; Datasets ; Denial of service attacks ; Gateways ; Heterogeneity ; Industrial applications ; Internet of Things ; Internet service providers ; Intrusion detection systems ; Machine learning ; Malware ; Neural networks</subject><ispartof>Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-15</ispartof><rights>Copyright © 2022 Nguyen Dat-Thinh et al.</rights><rights>Copyright © 2022 Nguyen Dat-Thinh et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</citedby><cites>FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</cites><orcidid>0000-0001-5092-2386 ; 0000-0002-2781-8043 ; 0000-0001-8321-7886</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2636153424/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2636153424?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,75126</link.rule.ids></links><search><contributor>Nassar, Hamed</contributor><contributor>Hamed Nassar</contributor><creatorcontrib>Dat-Thinh, Nguyen</creatorcontrib><creatorcontrib>Xuan-Ninh, Ho</creatorcontrib><creatorcontrib>Kim-Hung, Le</creatorcontrib><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><title>Wireless communications and mobile computing</title><description>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Collaboration</subject><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Data collection</subject><subject>Datasets</subject><subject>Denial of service attacks</subject><subject>Gateways</subject><subject>Heterogeneity</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Internet service providers</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Neural networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kE9LAzEQxYMoWKs3P0DAo67N382ut1K1Flo8tJ5Dmk1qSrupSRbptzdLxaMwzDyYHzO8B8AtRo8Ycz4iiJBRjQUlNT4DA8wpKqpSiPM_XdaX4CrGLUKIIoIHYLpwzdL59ATHcNHtkotJbQyctSl00fkWPptkdOrV8hiT2UPrQ782oTUJegtXn67dxGtwYdUumpvfOQQfry-ryVsxf5_OJuN5oSkVqWiEUFZYXBtGdF01gnONFGoUJZZrRrChuXKrKVFcMS1wqddlVTK2poRUdAjuTncPwX91Jia59V1o80tJSlpmm4ywTD2cKB18jMFYeQhur8JRYiT7qGQflfyNKuP3JzxbadS3-5_-AaeCZsE</recordid><startdate>20220221</startdate><enddate>20220221</enddate><creator>Dat-Thinh, Nguyen</creator><creator>Xuan-Ninh, Ho</creator><creator>Kim-Hung, Le</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-5092-2386</orcidid><orcidid>https://orcid.org/0000-0002-2781-8043</orcidid><orcidid>https://orcid.org/0000-0001-8321-7886</orcidid></search><sort><creationdate>20220221</creationdate><title>MidSiot: A Multistage Intrusion Detection System for Internet of Things</title><author>Dat-Thinh, Nguyen ; Xuan-Ninh, Ho ; Kim-Hung, Le</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Collaboration</topic><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Data collection</topic><topic>Datasets</topic><topic>Denial of service attacks</topic><topic>Gateways</topic><topic>Heterogeneity</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Internet service providers</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Neural networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dat-Thinh, Nguyen</creatorcontrib><creatorcontrib>Xuan-Ninh, Ho</creatorcontrib><creatorcontrib>Kim-Hung, Le</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dat-Thinh, Nguyen</au><au>Xuan-Ninh, Ho</au><au>Kim-Hung, Le</au><au>Nassar, Hamed</au><au>Hamed Nassar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>MidSiot: A Multistage Intrusion Detection System for Internet of Things</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-02-21</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT devices lack solid security mechanisms and hardware security supports because of their limitations in computational capability. In addition, the heterogeneity of devices in IoT networks causes nontrivial challenges in detecting security threats. In this article, we present a collaborative intrusion detection system (IDS), namely, MidSiot, deployed at both Internet gateways and IoT local gateways. Our proposed IDS consists of three stages: (1) classifying the type of each IoT device in the IoT network; (2) differentiating between benign and malicious network traffic; and (3) identifying the type of attacks targeting IoT devices. The last two stages are handled by the Internet gateways, whereas the first stage is on the local gateway to leverage the computational resources from edge devices. The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of 99.68% and outperforms state-of-the-art IDSs. This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/9173291</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-5092-2386</orcidid><orcidid>https://orcid.org/0000-0002-2781-8043</orcidid><orcidid>https://orcid.org/0000-0001-8321-7886</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-02, Vol.2022, p.1-15 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2636153424 |
source | Wiley Online Library; Publicly Available Content Database |
subjects | Accuracy Algorithms Collaboration Communications traffic Computer networks Cybersecurity Data collection Datasets Denial of service attacks Gateways Heterogeneity Industrial applications Internet of Things Internet service providers Intrusion detection systems Machine learning Malware Neural networks |
title | MidSiot: A Multistage Intrusion Detection System for Internet of Things |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T05%3A13%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=MidSiot:%20A%20Multistage%20Intrusion%20Detection%20System%20for%20Internet%20of%20Things&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Dat-Thinh,%20Nguyen&rft.date=2022-02-21&rft.volume=2022&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/9173291&rft_dat=%3Cproquest_cross%3E2636153424%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-d77af7f19e42c98d755c0a0da32f5c421e31e3e31932a5a4c716cb68644b32283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2636153424&rft_id=info:pmid/&rfr_iscdi=true |