A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT

At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding s...

Full description

Bibliographic Details
Main Authors: Carlos D. Morales-Molina, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Hector Perez-Meana, Jesus Olivares-Mercado, Jose Portillo-Portillo, Victor Sanchez, Luis Javier Garcia-Villalba
Format: Article
Language:English
Published: MDPI AG 2021-05-01
Series:Sensors
Subjects:
IoT
IDS
Online Access:https://www.mdpi.com/1424-8220/21/9/3173
id doaj-c689c207a5c64606ac139517a6224d71
record_format Article
spelling doaj-c689c207a5c64606ac139517a6224d712021-05-31T23:06:36ZengMDPI AGSensors1424-82202021-05-01213173317310.3390/s21093173A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoTCarlos D. Morales-Molina0Aldo Hernandez-Suarez1Gabriel Sanchez-Perez2Linda K. Toscano-Medina3Hector Perez-Meana4Jesus Olivares-Mercado5Jose Portillo-Portillo6Victor Sanchez7Luis Javier Garcia-Villalba8Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoDepartment of Computer Science, University of Warwick, Coventry CV4 7AL, UKGroup of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, SpainAt present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.https://www.mdpi.com/1424-8220/21/9/3173Clone ID attackdeep learningInternet of ThingsIoTintrusion detectionIDS
collection DOAJ
language English
format Article
sources DOAJ
author Carlos D. Morales-Molina
Aldo Hernandez-Suarez
Gabriel Sanchez-Perez
Linda K. Toscano-Medina
Hector Perez-Meana
Jesus Olivares-Mercado
Jose Portillo-Portillo
Victor Sanchez
Luis Javier Garcia-Villalba
spellingShingle Carlos D. Morales-Molina
Aldo Hernandez-Suarez
Gabriel Sanchez-Perez
Linda K. Toscano-Medina
Hector Perez-Meana
Jesus Olivares-Mercado
Jose Portillo-Portillo
Victor Sanchez
Luis Javier Garcia-Villalba
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
Sensors
Clone ID attack
deep learning
Internet of Things
IoT
intrusion detection
IDS
author_facet Carlos D. Morales-Molina
Aldo Hernandez-Suarez
Gabriel Sanchez-Perez
Linda K. Toscano-Medina
Hector Perez-Meana
Jesus Olivares-Mercado
Jose Portillo-Portillo
Victor Sanchez
Luis Javier Garcia-Villalba
author_sort Carlos D. Morales-Molina
title A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_short A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_full A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_fullStr A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_full_unstemmed A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_sort dense neural network approach for detecting clone id attacks on the rpl protocol of the iot
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2021-05-01
description At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.
topic Clone ID attack
deep learning
Internet of Things
IoT
intrusion detection
IDS
url https://www.mdpi.com/1424-8220/21/9/3173
work_keys_str_mv AT carlosdmoralesmolina adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT aldohernandezsuarez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT gabrielsanchezperez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT lindaktoscanomedina adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT hectorperezmeana adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT jesusolivaresmercado adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT joseportilloportillo adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT victorsanchez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT luisjaviergarciavillalba adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT carlosdmoralesmolina denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT aldohernandezsuarez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT gabrielsanchezperez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT lindaktoscanomedina denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT hectorperezmeana denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT jesusolivaresmercado denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT joseportilloportillo denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT victorsanchez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT luisjaviergarciavillalba denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
_version_ 1721418328128356352