A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
Abstract
:1. Introduction
Aiming and Research Contributions
- One of the first detection frameworks for Clone ID Attack based on Artificial Intelligence algorithms is developed; the construction is based on the following premises:
- The pre-processing of traffic samples obtained by simulations with real traffic from IoT and WSN sensors, which can filter, scale, and reduce the complexity of the samples;
- The use of low-cost feature selection and extraction techniques, in order to ideally represent key evidence resulting from an attack and regular behaviours over a WSN.
- The presentation of a possible real deployment detection scenario, taking into account the on-premise capabilities and constraints of current IDS/IPS systems, as well as the implications of using an ML-based solution.
2. The RPL Protocol
2.1. Clone ID Attack on the RPL Protocol
2.2. Detecting a Clone ID Attack
3. Related Work
4. Proposed Framework
4.1. Data Collection
4.2. Data Pre-Processing
- Data set balancing: As stated in [49], the samples within network captures are considerably smaller than those from benign applications, leading to the possibility of overfitting and classification downgrading. That being the case, algorithm estimations may always generalize the majority class features, overlapping the minority ones [50]; for example, in [51] the importance of data set balancing regarding a cervical cancer prediction model (CCPM) using risk factors as inputs was emphasized. In this case, the authors balanced their data set by using a synthetic minority over-sampling technique (SMOTE), due to their use of a Random Forest classifier. Although SMOTE performs better than other re-sampling techniques in traditional machine learning scenarios, in accordance with [52], Random Over-Sampling methods are better, as, in a real network traffic detection and filtering scenario, the generation of SMOTE samples could not be practical for high dimensional data. It would also not be ideal to use under-sampling, as it has been shown that, by removing samples from a majority class, key evidence that may be useful in feature engineering procedures could be lost. Therefore in the pre-processing stage in this proposal, a Random Over-Sampling (ROS) procedure was performed with no replacement.
- Value transformation: Features that contain nominal and categorical data, such as IPv6 source and destination addresses ( and ), were transformed into discrete values (Label Encoding), in a range between 0 (the first host) and n (the last one). In the case that a feature was comprised of a categorical sequence (i.e., , , , , , and ), the transformation was a reduction to a sparse numerical array using One-Hot Encoding (OHE). After the conversion, each series were replaced by values between 0 (representing the absence of addresses) and 1 (active values).
Algorithm 1: Preprocessing tasks over each data set. |
- is the set of original samples, where x is a sample and X is the data set;
- are the subsets belonging to minority and majority classes, respectively;
- L = {ipv6.src, ipv6.dst} represents the set of categorical features to encode to discrete values;
- C = L ∪ {icmpv6.code, wpan.dst_addr_mode, wpan.fcf, 6lowpan.pattern} represents the set of categorical features to transform to real values;
- U = {frame.time_delta, frame.time_epoch, frame.time_relative, frame.cap_len, frame.len, frame.number, wpan.fcs, wpan.frame_length, wpan.seq_no, ipv6.plen, icmpv6.checksum} represents the set of numerical features;
- k is the number of minority samples A contained in X; and
- is the final balanced set, resulting from Label Encoding, OHE, and random selection and sampling without replacement.
4.3. Unsupervised Pre-Training
4.4. Supervised Classification
5. Results and Discussion
- is the number of attacks classified as attacks;
- is the number of normal conversations classified as normal;
- is the number of normal conversations misclassified as attacks; and
- is the number of attacks misclassified as normal conversations.
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Sethi, P.; Sarangi, S.R. Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 2017. [Google Scholar] [CrossRef] [Green Version]
- Panneta, K. Gartner top strategic predictions for 2018 and beyond. Smarter Gart. October 2017. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-strategic-predictions-for-2018-and-beyond/ (accessed on 3 May 2021).
- Dave, E. How the next evolution of the internet is changing everything. Internet Things 2011. Available online: http://www.supplychain247.com/paper/the_internet_of_things_how_the_next_evolution_of_the_internet_is_changing/Cisco (accessed on 3 May 2021).
- Ou, Q.; Zhen, Y.; Li, X.; Zhang, Y.; Zeng, L. Application of internet of things in smart grid power transmission. In Proceedings of the 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, Vancouver, BC, Canada, 26–28 June 2012; pp. 96–100. [Google Scholar]
- Ahmed, R.Z.; Biradar, R.C.; Chaudhari, S.S. Cluster-based data aggregation for pest identification in coffee plantations using wireless sensor networks. Comput. Electr. Eng. 2016, 56, 591–607. [Google Scholar] [CrossRef]
- Chintalapudi, K.; Fu, T.; Paek, J.; Kothari, N.; Rangwala, S.; Caffrey, J.; Masri, S. Monitoring civil structures with a wireless sensor network. IEEE Internet Comput. 2006, 10, 26–34. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Verma, A.; Ranga, V. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sens. J. 2020, 20, 5666–5690. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Silva, J.S. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Wu, J.; Yuan, S.; Zhou, G.; Ji, S.; Wang, Z.; Wang, Y. Design and evaluation of a wireless sensor network based aircraft. Sensors 2009, 9, 4195–4210. [Google Scholar] [CrossRef]
- Mangelkar, S.; Dhage, S.N.; Nimkar, A.V. A comparative study on RPL attacks and security solutions. In Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2), Coimbatore, Tamil Nadu, India, 23–24 June 2017; pp. 1–6. [Google Scholar]
- Verma, A.; Ranga, V. Analysis of routing attacks on RPL based 6LoWPAN networks. Int. J. Grid Distrib. Comput 2018, 11, 43–56. [Google Scholar] [CrossRef]
- Bakhsh, S.T.; Alghamdi, S.; Alsemmeari, R.A.; Hassan, S.R. An adaptive intrusion detection and prevention system for Internet of Things. Int. J. Distrib. Sens. Netw. 2019, 15. [Google Scholar] [CrossRef]
- Musa, U.S.; Chhabra, M.; Ali, A.; Kaur, M. Intrusion Detection System using Machine Learning Techniques: A Review. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, Tamilnadu, India, 10–12 September 2020; pp. 149–155. [Google Scholar]
- Kamble, A.; Malemath, V.S.; Patil, D. Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In Proceedings of the 2017 International Conference on Emerging Trends and Innovation in ICEI (ICT), Yashada, Pune, India, 3–5 February 2017; pp. 33–39. [Google Scholar]
- Wallgren, L.; Raza, S.; Voigt, T. Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 2013, 9, 794326. [Google Scholar] [CrossRef]
- Dvir, A.; Buttyan, L. VeRA-version number and rank authentication in RPL. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17–21 October 2011; pp. 709–714. [Google Scholar]
- Conti, M.; Di Pietro, R.; Mancini, L.; Mei, A. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secure Comput. 2010, 8, 685–698. [Google Scholar] [CrossRef]
- Cakir, S.; Toklu, S.; Yalcin, N. RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning. IEEE Access 2020, 8, 183678–183689. [Google Scholar] [CrossRef]
- Yavuz, F.Y.; Devrim, Ü.N.A.L.; Ensar, G.Ü.L. Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Int. Syst. 2018, 12, 39–58. [Google Scholar] [CrossRef] [Green Version]
- Pongle, P.; Chavan, G. Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 2015, 121, 1–9. [Google Scholar] [CrossRef]
- Singh, V.P.; Ukey, A.S.A.; Jain, S. Signal strength based hello flood attack detection and prevention in wireless sensor networks. Int. J. Comput. Appl. 2013, 62, 975–8887. [Google Scholar]
- Singh, V.P.; Jain, S.; Singhai, J. Hello flood attack and its countermeasures in wireless sensor networks. Int. J. Comput. Sci. Issues 2010, 7, 23. [Google Scholar]
- Kasinathan, P.; Pastrone, C.; Spirito, M.A.; Vinkovits, M. Denial-of-Service detection in 6LoWPAN based Internet of Things. In Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013; pp. 600–607. [Google Scholar]
- Anthoniraj, J.; Razak, T.A. Clone attack detection protocols in wireless sensor networks: A survey. Int. J. Comput. Appl. 2014, 98. [Google Scholar] [CrossRef] [Green Version]
- Kiran, K.S.; Devisetty, R.K.; Kalyan, N.P.; Mukundini, K.; Karthi, R. Building a Intrusion Detection System for IoT Environment using Machine Learning Techniques. Procedia Comput. Sci. 2020, 171, 2372–2379. [Google Scholar] [CrossRef]
- Kushalnagar, N.; Montenegro, G.; Schumacher, C. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals; RFC 4919 (Informational); Internet Engineering Task Force. 2007. Available online: https://tools.ietf.org/html/rfc4919 (accessed on 3 May 2021).
- Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; RPL, A.R. IPv6 routing protocol for low-power and lossy networks. RFC6550 of IETF 2012. [Google Scholar]
- Avila, K.; Jabba, D.; Gomez, J. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Appl. Sci. 2020, 10, 6472. [Google Scholar] [CrossRef]
- Sobral, J.V.; Rodrigues, J.J.; Rabêlo, R.A.; Al-Muhtadi, J.; Korotaev, V. Routing protocols for low power and lossy networks in internet of things applications. Sensors 2019, 19, 2144. [Google Scholar] [CrossRef] [Green Version]
- Numan, M.; Subhan, F.; Khan, W.Z.; Hakak, S.; Haider, S.; Reddy, G.T.; Alazab, M. A systematic review on clone node detection in static wireless sensor networks. IEEE Access 2020, 8, 65450–65461. [Google Scholar] [CrossRef]
- Arshad, J.; Azad, M.A.; Abdellatif, M.M.; Rehman, M.H.U.; Salah, K. COLIDE: A collaborative intrusion detection framework for Internet of Things. IET Netw. 2018, 8, 3–14. [Google Scholar] [CrossRef] [Green Version]
- Nunes-Vaz, R.; Lord, S.; Ciuk, J. A More Rigorous Framework for Security-in-Depth. J. Appl. Secur. Res. 2011, 6, 372–393. [Google Scholar] [CrossRef]
- Coole, M.; Corkill, J.; Woodward, A. Defence in Depth, Protection in Depth and Security in Depth: A Comparative Analysis towards a Common Usage Language; SRI Security Research Institute, Edith Cowan University: Perth, Australia, 2012. [Google Scholar]
- Maheswari, P.U.; Kumar, P.G. Dynamic detection and prevention of clone attack in wireless sensor networks. Wirel. Pers. Commun. 2017, 94, 2043–2054. [Google Scholar] [CrossRef]
- Sharma, M.; Elmiligi, H.; Gebali, F.; Verma, A. Simulating attacks for rpl and generating multi-class dataset for supervised machine learning. In Proceedings of the 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 17–19 October 2019; pp. 0020–0026. [Google Scholar]
- Yahyaoui, A.; Yaakoubi, F.; Abdellatif, T. Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure. In Proceedings of the International Conference on Smart Homes and Health Telematics, Hammamet, Tunisia, 24–26 June 2020; pp. 28–40. [Google Scholar]
- Sharma, D.; Mishra, I.; Jain, S. A detailed classification of routing attacks against RPL in internet of things. IJARIIT 2017, 3, 692–703. [Google Scholar]
- Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the 2015 International conference on pervasive computing (ICPC), St. Louis, MO, USA, 23–27 March 2015; pp. 1–6. [Google Scholar]
- Newsome, J.; Shi, E.; Song, D.; Perrig, A. The sybil attack in sensor networks: Analysis and defenses. In Proceedings of the Third international symposium on information processing in sensor networks, Berkeley, CA, USA, 26–27 April 2004; pp. 259–268. [Google Scholar]
- Zhang, K.; Liang, X.; Lu, R.; Shen, X. Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 2014, 1, 372–383. [Google Scholar] [CrossRef]
- Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, 11–13 May 2016; pp. 1–6. [Google Scholar]
- Rezvy, S.; Petridis, M.; Lasebae, A.; Zebin, T. Intrusion Detection and Classification with Autoencoded Deep Neural Network. In Innovative Security Solutions for Information Technology and Communications; Springer International Publishing: Cham, Switzerland, 2019; pp. 142–156. [Google Scholar] [CrossRef] [Green Version]
- Dhanabal, L.; Shantharajah, S.P. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. IJARCCE 2015, 4, 446–452. [Google Scholar] [CrossRef]
- Al-Qatf, M.; Lasheng, Y.; Al-Habib, M.; Al-Sabahi, K. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 2018, 6, 52843–52856. [Google Scholar] [CrossRef]
- Mahmud, A.; Hossain, F.; Choity, T.A.; Juhin, F. Simulation and Comparison of RPL, 6LoWPAN, and CoAP Protocols Using Cooja Simulator. In Proceedings of the International Joint Conference on Computational Intelligence, Budapest, Hungary, 2–4 November 2020; pp. 317–326. [Google Scholar]
- Merino, B. Instant Traffic Analysis with Tshark How-to; Packt Publishing Ltd.: Birmingham, UK, 2013. [Google Scholar]
- Diaz, A.; Sanchez, P. Simulation of attacks for security in wireless sensor network. Sensors 2016, 16, 1932. [Google Scholar] [CrossRef] [Green Version]
- Gonzalez-Cuautle, D.; Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, L.K.; Portillo-Portillo, J.; Olivares-Mercado, J.; Sandoval-Orozco, A.L. Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets. Appl. Sci. 2020, 10, 794. [Google Scholar] [CrossRef] [Green Version]
- Garcia, V.; Sanchez, J.S.; Mollineda, R.A. Exploring the performance of resampling strategies for the class imbalance problem. In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, Cordoba, Spain, 1–4 June 2010; pp. 541–549. [Google Scholar]
- Ijaz, M.F.; Attique, M.; Son, Y. Data-driven cervical cancer prediction model with outlier detection and over-sampling methods. Sensors 2020, 20, 2809. [Google Scholar] [CrossRef]
- Mohammed, R.; Rawashdeh, J.; Abdullah, M. Machine Learning with Oversampling and Undersampling Techniques: Overview Study and Experimental Results. In Proceedings of the 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 243–248. [Google Scholar]
- Abdulhammed, R.; Musafer, H.; Alessa, A.; Faezipour, M.; Abuzneid, A. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection. Electronics 2019, 8, 322. [Google Scholar] [CrossRef] [Green Version]
- Ng, A. Sparse autoencoder. CS294A Lect. Notes 2011, 72, 1–19. [Google Scholar]
- Van, N.T.; Thinh, T.N. Temporal Features Learning Using Autoencoder for Anomaly Detection in Network Traffic. In Proceedings of the International Conference on Green Technology and Sustainable, Da Nang City, Vietnam, 27–28 November 2020; pp. 15–26. [Google Scholar]
- Jing, L.; Tian, Y. Self-supervised visual feature learning with deep neural networks: A survey. IEEE PAMI 2020. [Google Scholar] [CrossRef]
- Goodfellow, I.; Bengio, Y.; Courville, A.; Bengio, Y. Deep Learning; MIT Press: Cambridge, UK, 2016; Volume 1. [Google Scholar]
- Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, K.; Martinez-Hernandez, V.; Perez-Meana, H.; Olivares-Mercado, J.; Sanchez, V. Social sentiment sensor in twitter for predicting cyber-attacks using ℓ1 regularization. Sensors 2018, 18, 1380. [Google Scholar] [CrossRef] [Green Version]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A survey of machine and deep learning methods for internet of things (IoT) security. EEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef] [Green Version]
- Alharbi, S.; Rodriguez, P.; Maharaja, R.; Iyer, P.; Subaschandrabose, N.; Ye, Z. Secure the internet of things with challenge response authentication in fog computing. In Proceedings of the 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 10–12 December 2017; pp. 1–2. [Google Scholar]
- Zhao, K.; Ge, L. A survey on the internet of things security. In Proceedings of the 2013 Ninth international conference on computational intelligence and security, Leshan, China, 14–25 December 2013; pp. 663–667. [Google Scholar]
- Panda, M.; Patra, M.R. Network intrusion detection using naive bayes. Int. J. Comput. Sci. Netw. 2007, 7, 258–263. [Google Scholar]
- Liao, Y.; Vemuri, V.R. Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 2002, 21, 439–448. [Google Scholar] [CrossRef]
- Tajbakhsh, A.; Rahmati, M.; Mirzaei, A. Intrusion detection using fuzzy association rules. Appl. Soft Comput. 2009, 9, 462–469. [Google Scholar] [CrossRef]
- Wang, H.B.; Yuan, Z.; Wang, C.D. Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. In Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing, Yunnan, China, 6–9 January 2009; pp. 450–454. [Google Scholar]
- Pelt, D.M.; Sethian, J.A. A mixed-scale dense convolutional neural network for image analysis. Proc. Natl. Acad. Sci. USA 2018, 115, 254–259. [Google Scholar] [CrossRef] [Green Version]
- Bianchini, M.; Scarselli, F. On the complexity of neural network classifiers: A comparison between shallow and deep architectures. IEEE Trans. Neural Netw. Learn. Syst. 2014, 25, 1553–1565. [Google Scholar] [CrossRef]
- Liang, C.; Shanmugam, B.; Azam, S.; Karim, A.; Islam, A.; Zamani, M.; Idris, N.B. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 2020, 9, 1120. [Google Scholar] [CrossRef]
- Liu, H.; Lang, B. Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci. 2020, 9, 4396. [Google Scholar] [CrossRef] [Green Version]
- Ali, F.; El-Sappagh, S.; Islam, S.R.; Kwak, D.; Ali, A.; Imran, M.; Kwak, K.S. A smart healthcare monitoring system for heart disease prediction based on ensemble deep learning and feature fusion. Inf. Fusion 2020, 63, 208–222. [Google Scholar] [CrossRef]
Code Field ID | Description |
---|---|
0x00 0x01 0x02 0x03 0x80 0x81 0x82 0x83 0x8A | DODAG Information Solicitation (DIS) DODAG Information Object (DIO) Destination Advertisement Object (DAO) Destination Advertisement Object Acknowledgment (DAO-ACK) Secure DODAG Information Solicitation Secure DODAG Information Object Secure Destination Advertisement Object Secure Destination Advertisement Object Acknowledgment Consistency Check |
Logging Information Gathering Capabilities | Detection Capabilities |
---|---|
-Timestamp (e.g., date and time) | -Application layer reconnaissance and attacks |
-Connection or session ID | -Network layer reconnaissance and attacks: |
-Event or alert type | Sinkhole attack ; |
-Rating (e.g., priority, severity, impact, confidence) | Neighbour attack; |
-Network, transport, and application layer IoT protocols: | DIS attack and |
CORPL ; CARP ; 6LoWPAN and RPL | Local repair attack |
-Source and destination IP addresses | -Unexpected application services |
-Source and destination TCP or UDP ports, or ICMP types and codes | |
-Number of bytes transmitted over the connection | |
-Decoded payload data, such as application requests and responses | |
-State-related information (e.g., authenticated username) |
Category | Description | Taxonomies | Memory Complexities Reported * |
---|---|---|---|
Centralized | Uses a powerful central Base Station (BS) to track each node position and its neighbours identity when joining to the network | Key usage-based Base station-based Neighbourhood social signature-based Cluster head-based Zone-based Neighbour ID-based | |
Distributed | Clone replication is applied to all network nodes with no central Base Station (BS) | Node to network broadcasting Witness node-based Generation- or group-based Neighbour-based Clustered-based Whiteness path-based Cluster head-based |
Authors | ML Algorithm | Attack | Data Set |
---|---|---|---|
Yavuz, F. Y. et al. [20] | Deep Feed-Forward Network (DFFN) | Decreased rank | Custom WSN data |
Hello flood | |||
Version number | |||
Hodo et al. [42] | MLP | UDP DDoS/DOS | NSL-KDD |
Al-Qatf et al. [45] | SAE and SVM | DoS, Probe, R2L, U2R | Custom TCP/UDP traffic |
Data Set Name | No. of Nodes | Malicious Nodes | Benign Nodes | Samples |
---|---|---|---|---|
cloneid_20n | 20 | 2 | 18 | 1,232,862 |
cloneid_50n | 50 | 5 | 45 | 1,576,668 |
cloneid_100n | 100 | 10 | 90 | 1,492,579 |
No. | Field Name | Description | Type of Feature |
---|---|---|---|
1 | frame.cap_len | Frame length stored into the capture file | Numerical |
2 | frame.len | Frame length on the wire | Numerical |
3 | frame.number | Frame Number | Numerical |
4 | frame.time_delta | Time delta from previous captured frame | Numerical |
5 | frame.time_epoch | Epoch Time | Numerical |
6 | frame.time_relative | Time since reference or first frame | Numerical |
7 | wpan.ack_request | Acknowledge Request | Categorical |
8 | wpan.dst_addr_mode | Destination Addressing Mode | Categorical |
9 | wpan.fcf | Frame Control Field | Numerical |
10 | wpan.fcs | Frame Check Sequence | Numerical |
11 | wpan.frame_length | Frame Length | Numerical |
12 | wpan.pending | Frame Pending | Categorical |
13 | wpan.seq_no | Sequence Number | Numerical |
14 | 6lowpan.pattern | Pattern | Categorical |
15 | ipv6.dst | Destination | Categorical |
16 | ipv6.plen | Payload Length | Numerical |
17 | ipv6.src | Source | Categorical |
18 | icmpv6.checksum | Checksum | Numerical |
19 | icmpv6.code | Code | Categorical |
20 | class | Normal or attack class | Numerical |
Data Set Name | No. of Features | Samples |
---|---|---|
cloneid_20n | 67 | 1,749,976 |
cloneid_50n | 121 | 2,131,328 |
cloneid_100n | 211 | 2,078,832 |
Algorithm | Drawbacks for Detecting IoT Attacks and Threats |
---|---|
DT [60] | Large data storage, computational complexity with high-dimensional network features, prone to over-fitting |
SVM [61] | Overlapping of class samples with large data sets, such as IoT network samples |
NB [62] | Inaccurate for finding feature relationships in complex data representations, comparable to impersonation and sybil attacks |
KNN [63] | Flawed and time-consuming processes for finding optimal neighbours over raw data corresponding to IoT packets |
AR [64] | Ineffective to map efficient rules in large IoT network nodes |
No. of Model | Configuration |
---|---|
1 | No Autoencoder + DNN |
2 | SAE + DNN |
3 | AE + DNN |
No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
---|---|---|---|---|---|
1 | SAE + DNN | 96.72 | 96.70 | 3:29:44 | |
2 | AE + DNN | 94.41 | 94.43 | 3:13:54 | |
3 | No Autoencoder + DNN | 93.46 | 93.36 | 4:20:30 |
No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
---|---|---|---|---|---|
1 | SAE + DNN | 99.65 | 99.65 | 2:56:20 | |
2 | AE + DNN | 99.08 | 99.08 | 4:05:47 | |
3 | No Autoencoder + DNN | 99.04 | 99.04 | 3:16:44 |
No. of Model | Configuration | Accuracy | F1-Score | Total Time | Complexity * |
---|---|---|---|---|---|
1 | SAE + DNN | 99.25 | 99.26 | 1:40:48 | |
2 | AE + DNN | 98.66 | 98.66 | 2:19:50 | |
3 | No Autoencoder + DNN | 98.53 | 98.53 | 1:41:24 |
Author | Algorithm | Accuracy |
---|---|---|
Yavuz, F. Y. [20] | Deep Feed Forward Network (DFFN) | 94.9% |
Hodo et al. [42] | Multi-level perceptron (MLP) | 99.4% |
Rezvy et al. [43] | Autoencoder A-DNN (DNN) | 99.3% |
Al-Qatf et al. [45] | SAE+SVM | 99.4% |
This proposal ( data set) | SAE + DNN | 96.72% |
This proposal ( data set) | SAE + DNN | 99.65% |
This proposal ( data set) | SAE + DNN | 99.25% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Morales-Molina, C.D.; Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, L.K.; Perez-Meana, H.; Olivares-Mercado, J.; Portillo-Portillo, J.; Sanchez, V.; Garcia-Villalba, L.J. A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT. Sensors 2021, 21, 3173. https://doi.org/10.3390/s21093173
Morales-Molina CD, Hernandez-Suarez A, Sanchez-Perez G, Toscano-Medina LK, Perez-Meana H, Olivares-Mercado J, Portillo-Portillo J, Sanchez V, Garcia-Villalba LJ. A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT. Sensors. 2021; 21(9):3173. https://doi.org/10.3390/s21093173
Chicago/Turabian StyleMorales-Molina, Carlos D., Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Hector Perez-Meana, Jesus Olivares-Mercado, Jose Portillo-Portillo, Victor Sanchez, and Luis Javier Garcia-Villalba. 2021. "A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT" Sensors 21, no. 9: 3173. https://doi.org/10.3390/s21093173
APA StyleMorales-Molina, C. D., Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, L. K., Perez-Meana, H., Olivares-Mercado, J., Portillo-Portillo, J., Sanchez, V., & Garcia-Villalba, L. J. (2021). A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT. Sensors, 21(9), 3173. https://doi.org/10.3390/s21093173