AU2021106250A4 - An iot based intrusion detection system - Google Patents

An iot based intrusion detection system Download PDF

Info

Publication number
AU2021106250A4
AU2021106250A4 AU2021106250A AU2021106250A AU2021106250A4 AU 2021106250 A4 AU2021106250 A4 AU 2021106250A4 AU 2021106250 A AU2021106250 A AU 2021106250A AU 2021106250 A AU2021106250 A AU 2021106250A AU 2021106250 A4 AU2021106250 A4 AU 2021106250A4
Authority
AU
Australia
Prior art keywords
data
module
dataset
intrusion detection
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021106250A
Inventor
Rajdeep Kumar
Manohar M
Alok Kumar Pani
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Manjunath Chinthakunta
Original Assignee
Manjunath Chinthakunta
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Manjunath Chinthakunta filed Critical Manjunath Chinthakunta
Priority to AU2021106250A priority Critical patent/AU2021106250A4/en
Application granted granted Critical
Publication of AU2021106250A4 publication Critical patent/AU2021106250A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Breeding Of Plants And Reproduction By Means Of Culturing (AREA)

Abstract

An intrusion detection system (100) for IOT devices, comprises of:an input module (102) for acquiring a plurality of data from plurality of the IOT devices connected in a network to form a dataset, wherein the dataset is created using smart space orchestration module to create synthetic data from the plurality of data acquired; a pre-processing module (104) connected to the input module (102) for eliminating missing data from the dataset and obtaining a continuous value, wherein the plurality of data is converted into feature vector upon pre processing the dataset; a feature extraction module (106) connected to the pre-processing module (104) for extracting and analyzing one or more features related to intrusion detection using a flower pollination algorithm; and a classification module (108) connected to the feature extraction module (106) for classifying the one or more features extracted to identify type of intrusion using a classification technique. 14 Accuracy 100 995 98.5 97.5 Methods FIGURE 3a Precision 99A 99.2 99 98.8 98A ~9tA 98.2 98 97.9 97A Methods FIGURE 3b

Description

Accuracy 100
995
98.5
97.5
Methods
FIGURE 3a
Precision 99A 99.2 99 98.8 98A ~9tA 98.2 98 97.9
97A
Methods
FIGURE 3b
ANIOT BASED INTRUSION DETECTION SYSTEM FIELD OF INVENTION
The present invention generally relates to internet of things. More particularly, the present invention relates to a system and a method for detecting attacks in IOT networks.
BACKGROUND OF THE INVENTION
Internet of Things (IoT) is an emerging technology that involves in monitoring the environment and the IoT networks and are most vulnerable to attacks due to various number of devices connected in the network. The Intrusion detection technique has been applied to analyze the anomaly in the network.
Machine learning techniques has been applied in the Intrusion detection system (IDS) and observed the higher performance in identifying the intrusion and malware. The existing method involves in IDS tends to be ineffective due to drawbacks of big data, centralization and low privacy.
The existing method has the drawback of the lower performance in the detection of the intrusion on IoT and is also inefficient in handling the streaming data of IoT system. Most of the method in the IDS has low efficiency in the intrusion detection. The Existing models have the limitation of inefficiency in the intrusion detection due to the overfit in the models.
To overcome the limitation of the existing method, the FPA method is proposed to increase the performance of the Intrusion detection in IoT. The FPA method has the advantages of the long-distance pollination and the flower consistency that effectively analyze the feature. The classifiers such as Logistic regression, SVM, ANN, decision tree and RF are used to analyze the performance of the proposed FPA method in IoT intrusion detection.
The technical advancements disclosed by the present invention overcomes the limitations and disadvantages of existing and convention systems and methods.
SUMMARY OF THE INVENTION
The present invention generally relates to a system and a method for intrusion detection in IOT.
An object of the present invention is to provide a system that increases the performance of the Intrusion detection in IoT.
Another object of the present invention is to provide a flower pollution algorithm having the long-distance pollination that effectively analyze the feature.
Another object of the present invention is to provide a system that provides a dataset with reduced missing values.
Another object of the present invention is to provide a system that selects the relevant features to improve the efficiency of the classification.
According to an aspect of the present invention, an intrusion detection system for IOT devices, wherein the system comprises of: an input module for acquiring a plurality of data from plurality of the IOT devices connected in a network to form a dataset, wherein the dataset is created using smart space orchestration module to create synthetic data from the plurality of data acquired; a pre-processing module is connected to the input module for eliminating missing data from the dataset and obtaining a continuous value, wherein the plurality of data is converted into feature vector upon pre-processing the dataset; a feature extraction module is connected to the pre-processing module for extracting and analyzing one or more features related to intrusion detection using a flower pollination algorithm; and a classification module is connected to the feature extraction module for classifying the one or more features extracted to identify type of intrusion using a classification technique.
According to an aspect of the present invention, the different steps involved in the method for intrusion detection in IOT devices, the step comprises of: acquiring using an input module, a plurality of data from plurality of the IOT devices to form a dataset; pre-processing the dataset, using a pre-processing module for eliminating missing data from the dataset and obtaining a continuous value, wherein converting the plurality of data into feature vector having a set of categorical data and a set of numerical data; extracting and analyzing one or more features using a feature extraction module for intrusion detection using a flower pollination algorithm, and classifying the one or more features extracted using a classification module to identify type of intrusion using a classification technique.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram of the components involved in the intrusion detection system,
Figure 2illustrates a flowchart of the different steps involved in the method for intrusion detection in IOT devices, and
Figure 3a and 3billustrate a graphical representation of the accuracy and precision of the FPA-ANN module used in the system.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
The term "Least recently used algorithm (LRU)" algorithm mainly makes use of the property of algorithms, that is locality of reference which means that data or code requested recently will be requested again and again. In other words, it replaces the least recently used page inside the cache memory.
The term "Least frequently used algorithm (LFU)" algorithm considers the frequency count of page, that is number of times page gets accessed. It assumes that the more the page's frequency, the more it gets accessed again. In other words, it replaces least frequently used page inside the cache memory if no space is there for newly requested page.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a block diagram of the components involved in the intrusion detection system, wherein the system comprises of: an input module (102), a pre-processing module (104), a feature extraction module (106), and a classification module (108).
The input module (102) for acquiring a plurality of data from plurality of the IOT devices connected in a network to form a dataset, wherein the dataset is created using smart space orchestration module to create synthetic data from the plurality of data acquired.
The IoT environment is created based on Distributed Smart Space Orchestration System (DS20S) to create synthetic data. The architecture is a collection of micro-services that communicate based on the Message Queuing Telemetry Transport (MQTT) protocol.
According to an embodiment, the dataset consists of 357,952 sample sand 13 features with normal data of 347,935 and anomalous data of ,017 that contains eight classes, which is used for classification. Features "Accessed Node Type" and "Value" contain the missing data of 148 and 2050, respectively. According to an alternate embodiment, the values may vary.
The pre-processing module (104) is connected to the input module (102) for eliminating missing data from the dataset and obtaining a continuous value, wherein the plurality of data is converted into feature vector upon pre-processing the dataset.
The "Accessed Node Type" column and "Value" column in DS20S dataset contain missing data that rise the anomaly in data transferring. "Accessed Node Type" feature has categorical value and the "Value" feature has continuous values. Apart from this, the timestamp column is eliminated from the dataset as this has a minimum correlation in the dataset's predicator variable normality.
The categorical data in the dataset are classified as ordinary and nominal values, and the numerical dataset is classified into Discrete and Continuous values. The next process involves to categorize the data into vectors and there are many ways to convert the values into vectors. The Label encoding techniques are used to convert the data into a feature vector. Most of the dataset features contain nominal categorical value and many unique values. The label encoding technique is applied in the dataset to convert values into a vector.
The feature extraction module (106) is connected to the pre processing module (104) for extracting and analyzing one or more features related to intrusion detection using a flower pollination algorithm (FPA).
The FPA method is the recent optimization technique and it has been used in the global optimization process. The FPA technique used in this research for feature selection in the IDS in IoT system. The FPA method is to idealize the flower pollination process with flower constancy and pollinator behavior. The four major rules involve in the FPA is given as follows:
1. In the global pollination process, the biotic and cross-pollination is considered and performed based on the Levy flights technique.
2. In local pollination process, a biotic and self-pollination is performed.
3. Flower constancy is considered as the reproduction probability that is proportional to the two similar flowers involved.
4. A switch probability p E [0,1] is applied to control the global and local pollination. The physical proximity and other factors such as wind local pollination have the influence on the fraction p in the overall pollination activities.
The classification module (108) is connected to the feature extraction module for classifying the one or more features extracted to identify type of intrusion using a classification technique.
The classification technique is Artificial Neural Network (ANN) which is the machine learning technique that is the basic for various deep learning algorithms. The raw data are used to train the ANN and this method has a greater number of turning parameter that makes the complex structure. This method requires more computation time to optimize the error than other techniques. For this purpose, the Neural Network algorithm are trained in the Graphics Processing Unit (GPU) using CUDA programming.
Each node of ANN is trained with the feature set X = X1,X2,X3,...Xn. The features are multiplied using some random weights, W = W1,W2,W3, ... , Wn and added with bias values, b = blb2,...bn. The values are provided as input to the non-linear activation function.
Figure 2illustrates a flowchart of the different steps involved in the method for intrusion detection in IOT devices, the step comprises of:
Step (202) discloses about acquiring using an input module (102), a plurality of data from plurality of the IOT devices to form a dataset.
Step (204) discloses about pre-processing the dataset, using a pre processing module (104) for eliminating missing data from the dataset and obtaining a continuous value, wherein converting the plurality of data into feature vector having a set of categorical data and a set of numerical data.
Step (206) discloses about extracting and analyzing one or more features using a feature extraction module (106) for intrusion detection using a flower pollination algorithm.
Step (208) discloses about classifying the one or more features extracted using a classification module (108) to identify type of intrusion using a classification technique.
Figure 3a and 3billustrate a graphical representation of the accuracy and precision of the FPA-ANN module used in the system.
The proposed FPA method has the higher accuracy of 99.5
% compared to the standard ANN and has the accuracy of 99.4 %. The FPA method has the advantages of the long-distance pollination and flower consistency, which increase the performance of the feature analysis. The long-distance pollination helps to analyze more feature and flower consistency helps to select more relevant features.
Figure 3a discloses about the accuracy of the various methods with FPA feature selection in the IoT intrusion detection. The classifier with FPA feature selection method is achieved accuracy compared to the existing classifiers. The proposed FPA-ANN method selects the relevant features for the classification that improves the efficiency of the classification and existing ANN method selects the features from the dataset without analysis. The FPA method has the advantage of better convergence that improve the efficiency of the intrusion detection model. The FPA with RF classifier has the accuracy of 99.5 %, while the existing RF method has the accuracy of 99.4 % in the IoT intrusion detection. The FPA method with the DT and ANN achieved high accuracy.
Figure 3b discloses about the precision value for the various method in the IoT intrusion detection is measured. The high precision value is achieved using the FPA in the feature selection method. The FPA method has better convergence that provides the relevant features for the classifier to improve the efficiency of the method. The FPA feature selection method increases the precision value in the IoT intrusion detection system. The FPA-ANN has the precision value of 99.1 % and the standard method as the precision value of 99 %.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims (7)

WE CLAIM:
1. An intrusion detection system (100) for IOT devices, wherein the system (100) comprises of:
an input module(102) for acquiring a plurality of data from plurality of the IOT devices connected in a network to form a dataset, wherein the dataset is created using smart space orchestration module to create synthetic data from the plurality of data acquired;
a pre-processing module (104) connected to the input module (102)for eliminating missing data from the dataset and obtaining a continuous value, wherein the plurality of data is converted into feature vector upon pre-processing the dataset;
a feature extraction module (106) connected to the pre-processing module (104)for extracting and analyzing one or more features related to intrusion detection using a flower pollination algorithm; and
a classification module (108)connected to the feature extraction module (106) for classifying the one or more features extracted to identify type of intrusion using a classification technique.
2.The system as claimed in claim 1, wherein the dataset includes a plurality of normal data and anomalous data with a plurality of classes that are classified using the classification module (108).
3. The system as claimed in claim 1, wherein a timestamp column is eliminated from the dataset by the pre-processing module (104).
4. The system as claimed in claim 1, wherein an encoding technique converts the plurality of data into the feature vector.
5. The system as claimed in claim 1, wherein the flower pollination algorithm optimizes training data of the feature extraction module (106) for accurate feature extraction.
6. The system as claimed in claim 1, wherein the classification technique is a deep learning algorithm that is trained in graphics processing module (GPU) using a programming technique such as Compute unified device architecture (CUDA) programming, wherein each of the plurality of feature is multiplied with a random weight and added with bias values.
7. An intrusion detection method for IOT devices, wherein the method comprises of:
acquiring using an input module (102), a plurality of data from plurality of the IOT devices to form a dataset;
pre-processing the dataset, using a pre-processing module (104) for eliminating missing data from the dataset and obtaining a continuous value, wherein converting the plurality of data into feature vector having a set of categorical data and a set of numerical data;
extracting and analyzing one or more features using a feature extraction module (106) for intrusion detection using a flower pollination algorithm; and
classifying the one or more features extracted using a classification module (108) to identify type of intrusion using a classification technique.
FIGURE 1
FIGURE 2
FIGURE 3a
FIGURE 3b
AU2021106250A 2021-08-20 2021-08-20 An iot based intrusion detection system Ceased AU2021106250A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021106250A AU2021106250A4 (en) 2021-08-20 2021-08-20 An iot based intrusion detection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021106250A AU2021106250A4 (en) 2021-08-20 2021-08-20 An iot based intrusion detection system

Publications (1)

Publication Number Publication Date
AU2021106250A4 true AU2021106250A4 (en) 2021-12-02

Family

ID=78716481

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021106250A Ceased AU2021106250A4 (en) 2021-08-20 2021-08-20 An iot based intrusion detection system

Country Status (1)

Country Link
AU (1) AU2021106250A4 (en)

Similar Documents

Publication Publication Date Title
CN109471938B (en) Text classification method and terminal
CN108717408B (en) Sensitive word real-time monitoring method, electronic equipment, storage medium and system
CN110351301B (en) HTTP request double-layer progressive anomaly detection method
US20190325344A1 (en) Machine learning predictive labeling system
JP2007503034A (en) Method and apparatus for automatically online detecting and classifying anomalous objects in a data stream
CN114244603B (en) Anomaly detection and comparison embedded model training and detection method, device and medium
CN108629358B (en) Object class prediction method and device
KR101968309B1 (en) SYSTEM AND METHOD FOR text classification
CN110636445A (en) WIFI-based indoor positioning method, device, equipment and medium
CN111476317B (en) Plant protection image non-dense pest detection method based on reinforcement learning technology
CN110659495A (en) Malicious code family classification method
CN113326177A (en) Index anomaly detection method, device, equipment and storage medium
CN116260642A (en) Knowledge distillation space-time neural network-based lightweight Internet of things malicious traffic identification method
CN114330469A (en) Rapid and accurate encrypted flow classification method and system
CN115705279A (en) Intelligent fault early warning method and device based on index data
AU2021106250A4 (en) An iot based intrusion detection system
CN113434857A (en) User behavior safety analysis method and system applying deep learning
CN113114691A (en) Network intrusion detection method, system, equipment and readable storage medium
CN115374711B (en) Service life prediction method of rotating multi-component system and related device
CN116150371A (en) Asset repayment plan mass data processing method based on sharingJDBC
CN114338058A (en) Information processing method, device and storage medium
JP2016053976A (en) Data generation method, device and program, retrieval processing method, and device and program
CN110650130A (en) Industrial control intrusion detection method based on multi-classification GoogLeNet-LSTM model
AU2021107017A4 (en) A machine learning-based system for detection of diseases and other breakout for effective counter measures
CN116775744B (en) Multi-source data fusion method and device and electronic equipment

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry