Authorisation, attack detection and avoidance framework for IoT devices

Internet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It i...

Full description

Bibliographic Details
Main Authors: Pradeep Sudhakaran, Chidambaranathan Malathy
Format: Article
Language:English
Published: Wiley 2020-09-01
Series:IET Networks
Subjects:
Online Access:https://doi.org/10.1049/iet-net.2019.0167
id doaj-5e6122accaee434989f80afdeb376673
record_format Article
spelling doaj-5e6122accaee434989f80afdeb3766732021-08-26T06:15:46ZengWileyIET Networks2047-49542047-49622020-09-019520921410.1049/iet-net.2019.0167Authorisation, attack detection and avoidance framework for IoT devicesPradeep Sudhakaran0Chidambaranathan Malathy1Department of Computer Science and EngineeringSRM Institute of Science and TechnologyKathankulathur603203IndiaDepartment of Computer Science and EngineeringSRM Institute of Science and TechnologyKathankulathur603203IndiaInternet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It is observed that severity of attack response was not considered. In this study, the authors propose to develop an authorisation, attack detection and avoidance framework for IoT devices. Initially, traffic collection agent continuously gathers packet level and flow level information for a given time interval. Then detection agent (DA) first checks the collected information with the attack rules table. If any matching attack pattern is found, it informs the attack type to response agent (RA). On the other hand, if no matching pattern is found, then the classification agent applies multi‐class support vector machine algorithm. Once the RA obtains the attack type from DA, then it estimates the severity of attack by computing the attack frequency over different time windows and appropriate action will be performed. Experimental results show that the proposed framework reduces 13% of unauthorised access and 19% false positive rate thereby increasing the detection accuracy by 0.6% and throughput.https://doi.org/10.1049/iet-net.2019.0167traffic collection agentpacket levelflow level informationdetection agentattack rules tablematching attack pattern
collection DOAJ
language English
format Article
sources DOAJ
author Pradeep Sudhakaran
Chidambaranathan Malathy
spellingShingle Pradeep Sudhakaran
Chidambaranathan Malathy
Authorisation, attack detection and avoidance framework for IoT devices
IET Networks
traffic collection agent
packet level
flow level information
detection agent
attack rules table
matching attack pattern
author_facet Pradeep Sudhakaran
Chidambaranathan Malathy
author_sort Pradeep Sudhakaran
title Authorisation, attack detection and avoidance framework for IoT devices
title_short Authorisation, attack detection and avoidance framework for IoT devices
title_full Authorisation, attack detection and avoidance framework for IoT devices
title_fullStr Authorisation, attack detection and avoidance framework for IoT devices
title_full_unstemmed Authorisation, attack detection and avoidance framework for IoT devices
title_sort authorisation, attack detection and avoidance framework for iot devices
publisher Wiley
series IET Networks
issn 2047-4954
2047-4962
publishDate 2020-09-01
description Internet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It is observed that severity of attack response was not considered. In this study, the authors propose to develop an authorisation, attack detection and avoidance framework for IoT devices. Initially, traffic collection agent continuously gathers packet level and flow level information for a given time interval. Then detection agent (DA) first checks the collected information with the attack rules table. If any matching attack pattern is found, it informs the attack type to response agent (RA). On the other hand, if no matching pattern is found, then the classification agent applies multi‐class support vector machine algorithm. Once the RA obtains the attack type from DA, then it estimates the severity of attack by computing the attack frequency over different time windows and appropriate action will be performed. Experimental results show that the proposed framework reduces 13% of unauthorised access and 19% false positive rate thereby increasing the detection accuracy by 0.6% and throughput.
topic traffic collection agent
packet level
flow level information
detection agent
attack rules table
matching attack pattern
url https://doi.org/10.1049/iet-net.2019.0167
work_keys_str_mv AT pradeepsudhakaran authorisationattackdetectionandavoidanceframeworkforiotdevices
AT chidambaranathanmalathy authorisationattackdetectionandavoidanceframeworkforiotdevices
_version_ 1721195995829633024