Authorisation, attack detection and avoidance framework for IoT devices
Internet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It i...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-09-01
|
Series: | IET Networks |
Subjects: | |
Online Access: | https://doi.org/10.1049/iet-net.2019.0167 |
id |
doaj-5e6122accaee434989f80afdeb376673 |
---|---|
record_format |
Article |
spelling |
doaj-5e6122accaee434989f80afdeb3766732021-08-26T06:15:46ZengWileyIET Networks2047-49542047-49622020-09-019520921410.1049/iet-net.2019.0167Authorisation, attack detection and avoidance framework for IoT devicesPradeep Sudhakaran0Chidambaranathan Malathy1Department of Computer Science and EngineeringSRM Institute of Science and TechnologyKathankulathur603203IndiaDepartment of Computer Science and EngineeringSRM Institute of Science and TechnologyKathankulathur603203IndiaInternet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It is observed that severity of attack response was not considered. In this study, the authors propose to develop an authorisation, attack detection and avoidance framework for IoT devices. Initially, traffic collection agent continuously gathers packet level and flow level information for a given time interval. Then detection agent (DA) first checks the collected information with the attack rules table. If any matching attack pattern is found, it informs the attack type to response agent (RA). On the other hand, if no matching pattern is found, then the classification agent applies multi‐class support vector machine algorithm. Once the RA obtains the attack type from DA, then it estimates the severity of attack by computing the attack frequency over different time windows and appropriate action will be performed. Experimental results show that the proposed framework reduces 13% of unauthorised access and 19% false positive rate thereby increasing the detection accuracy by 0.6% and throughput.https://doi.org/10.1049/iet-net.2019.0167traffic collection agentpacket levelflow level informationdetection agentattack rules tablematching attack pattern |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Pradeep Sudhakaran Chidambaranathan Malathy |
spellingShingle |
Pradeep Sudhakaran Chidambaranathan Malathy Authorisation, attack detection and avoidance framework for IoT devices IET Networks traffic collection agent packet level flow level information detection agent attack rules table matching attack pattern |
author_facet |
Pradeep Sudhakaran Chidambaranathan Malathy |
author_sort |
Pradeep Sudhakaran |
title |
Authorisation, attack detection and avoidance framework for IoT devices |
title_short |
Authorisation, attack detection and avoidance framework for IoT devices |
title_full |
Authorisation, attack detection and avoidance framework for IoT devices |
title_fullStr |
Authorisation, attack detection and avoidance framework for IoT devices |
title_full_unstemmed |
Authorisation, attack detection and avoidance framework for IoT devices |
title_sort |
authorisation, attack detection and avoidance framework for iot devices |
publisher |
Wiley |
series |
IET Networks |
issn |
2047-4954 2047-4962 |
publishDate |
2020-09-01 |
description |
Internet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve huge overhead and high false positives. It is observed that severity of attack response was not considered. In this study, the authors propose to develop an authorisation, attack detection and avoidance framework for IoT devices. Initially, traffic collection agent continuously gathers packet level and flow level information for a given time interval. Then detection agent (DA) first checks the collected information with the attack rules table. If any matching attack pattern is found, it informs the attack type to response agent (RA). On the other hand, if no matching pattern is found, then the classification agent applies multi‐class support vector machine algorithm. Once the RA obtains the attack type from DA, then it estimates the severity of attack by computing the attack frequency over different time windows and appropriate action will be performed. Experimental results show that the proposed framework reduces 13% of unauthorised access and 19% false positive rate thereby increasing the detection accuracy by 0.6% and throughput. |
topic |
traffic collection agent packet level flow level information detection agent attack rules table matching attack pattern |
url |
https://doi.org/10.1049/iet-net.2019.0167 |
work_keys_str_mv |
AT pradeepsudhakaran authorisationattackdetectionandavoidanceframeworkforiotdevices AT chidambaranathanmalathy authorisationattackdetectionandavoidanceframeworkforiotdevices |
_version_ |
1721195995829633024 |