• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 17, Pages: 1268-1275

Original Article

Intrusion Detection Using IDMAL Algorithm for IOT Devices

Received Date:15 October 2022, Accepted Date:26 March 2023, Published Date:02 May 2023

Abstract

Objective: To develop a system based on fog computing to maintain the security of the user data and privacy in the IoT environment. The proposed work is intended to predict the assaults, automatically recognize known attacks, and select the appropriate defense mechanism to safeguard the private data in an IoT environment. Methods: The proposed approach is used to recognize a variety of intrusion methods, including DDOS, DOS, and multistage attacks developed by hackers with the explicit goal of seizing control of the entire IoT network and capturing the precious data. Initially the proposed work involves training the algorithm with a small amount of data, and when dynamic data begins to flow into IOT devices, the trained part will identify the potential attacks based on the earlier pattern built. Finding: The experimental evaluation is carried out for the proposed IDMAL along with two more existing algorithms ANN and Naïve Bayes to determine the performance of the proposed algorithm. The experimental results it is quite clear that the IDMAL after 12.3 seconds of training the attack detection accuracy is 97.1% with a false rate of 0.31%. Novelty: With a higher level of accuracy and precision, the suggested IDMAL algorithm makes use of cutting-edge methodologies to interpret attacks in advance utilizing a prediction mechanism from the IoT traffic data. The proposed algorithm is compared with two of the well-known existing algorithms namely ANN and Naïve Bayes and from the experimental result; it is quite obvious that the proposed algorithm is much more accurate and precise in detecting the attacks.

Keywords: Iot; Cloud computing; Fog computing; Security; Machine learning

References

  1. Alaba FA, Othman M, Hashem IAT, Alotaibi F. Internet of Things security: A survey. Journal of Network and Computer Applications. 2017;88:10–28. Available from: https://doi.org/10.1016/j.jnca.2017.04.002
  2. Ammar M, Russello G, Crispo B. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications. 2018;38:8–27. Available from: https://iranarze.ir/wp-content/uploads/2018/02/E5779-IranArze.pdf
  3. Alsoufi MA, Razak S, Siraj MM, Nafea I, Ghaleb FA, Saeed F, et al. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review. Applied Sciences. 11(18):8383. Available from: https://doi.org/10.3390/app11188383
  4. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Communications Surveys & Tutorials. 2019;21(3):2671–2701. Available from: https://doi.org/10.1109/COMST.2019.2896380
  5. Kumar P, Gupta GP, Tripathi R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. Journal of Ambient Intelligence and Humanized Computing. 2021;12(10):9555–9572. Available from: https://doi.org/10.1007/s12652-020-02696-3

Copyright

© 2023 Arul & Shanmugapriya. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee

DON'T MISS OUT!

Subscribe now for latest articles and news.