A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding s...
Main Authors: | , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-05-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/9/3173 |
id |
doaj-c689c207a5c64606ac139517a6224d71 |
---|---|
record_format |
Article |
spelling |
doaj-c689c207a5c64606ac139517a6224d712021-05-31T23:06:36ZengMDPI AGSensors1424-82202021-05-01213173317310.3390/s21093173A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoTCarlos D. Morales-Molina0Aldo Hernandez-Suarez1Gabriel Sanchez-Perez2Linda K. Toscano-Medina3Hector Perez-Meana4Jesus Olivares-Mercado5Jose Portillo-Portillo6Victor Sanchez7Luis Javier Garcia-Villalba8Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoInstituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, MexicoDepartment of Computer Science, University of Warwick, Coventry CV4 7AL, UKGroup of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, SpainAt present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.https://www.mdpi.com/1424-8220/21/9/3173Clone ID attackdeep learningInternet of ThingsIoTintrusion detectionIDS |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Carlos D. Morales-Molina Aldo Hernandez-Suarez Gabriel Sanchez-Perez Linda K. Toscano-Medina Hector Perez-Meana Jesus Olivares-Mercado Jose Portillo-Portillo Victor Sanchez Luis Javier Garcia-Villalba |
spellingShingle |
Carlos D. Morales-Molina Aldo Hernandez-Suarez Gabriel Sanchez-Perez Linda K. Toscano-Medina Hector Perez-Meana Jesus Olivares-Mercado Jose Portillo-Portillo Victor Sanchez Luis Javier Garcia-Villalba A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT Sensors Clone ID attack deep learning Internet of Things IoT intrusion detection IDS |
author_facet |
Carlos D. Morales-Molina Aldo Hernandez-Suarez Gabriel Sanchez-Perez Linda K. Toscano-Medina Hector Perez-Meana Jesus Olivares-Mercado Jose Portillo-Portillo Victor Sanchez Luis Javier Garcia-Villalba |
author_sort |
Carlos D. Morales-Molina |
title |
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_short |
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_full |
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_fullStr |
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_full_unstemmed |
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_sort |
dense neural network approach for detecting clone id attacks on the rpl protocol of the iot |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2021-05-01 |
description |
At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts. |
topic |
Clone ID attack deep learning Internet of Things IoT intrusion detection IDS |
url |
https://www.mdpi.com/1424-8220/21/9/3173 |
work_keys_str_mv |
AT carlosdmoralesmolina adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT aldohernandezsuarez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT gabrielsanchezperez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT lindaktoscanomedina adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT hectorperezmeana adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT jesusolivaresmercado adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT joseportilloportillo adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT victorsanchez adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT luisjaviergarciavillalba adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT carlosdmoralesmolina denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT aldohernandezsuarez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT gabrielsanchezperez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT lindaktoscanomedina denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT hectorperezmeana denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT jesusolivaresmercado denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT joseportilloportillo denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT victorsanchez denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT luisjaviergarciavillalba denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot |
_version_ |
1721418328128356352 |