基于物联网网络行为的跨层入侵检测

Amar Amouri, V. Alaparthy, S. Morgera
{"title":"基于物联网网络行为的跨层入侵检测","authors":"Amar Amouri, V. Alaparthy, S. Morgera","doi":"10.1109/WAMICON.2018.8363921","DOIUrl":null,"url":null,"abstract":"The intrusion detection systems gained major significance in the field of internet of things (IoT) as the communicating entities could reach thousands of nodes. An intrusion detection system (IDS) that uses a hybrid learning approach, consists of two stages of detection, local and global. The data collection for the classification purposes at the local detection phase is intended to mimic the network behavior rather than node behavior and the ability to infer the state of the node. A scheme based on obtaining datasets related to the packet counts for normal and malicious cases, collected using promiscuous mode, is adopted in the network. The local detection is conducted by the dedicated sniffers (DS) where each DS uses supervised learning approach based on decision trees to generate correctly classified instances (CCIs). The global stage collects the CCIs sent from the dedicated sniffers (DS) to the super node (SN) and applies an iterative linear regression to generate a time-based profile called the accumulated measure of fluctuation (AMoF) for malicious and normal nodes. A profile of a malicious and a normal node is obtained, and an anomaly is detected after three iterations (processed samples).","PeriodicalId":193359,"journal":{"name":"2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Cross layer-based intrusion detection based on network behavior for IoT\",\"authors\":\"Amar Amouri, V. Alaparthy, S. Morgera\",\"doi\":\"10.1109/WAMICON.2018.8363921\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The intrusion detection systems gained major significance in the field of internet of things (IoT) as the communicating entities could reach thousands of nodes. An intrusion detection system (IDS) that uses a hybrid learning approach, consists of two stages of detection, local and global. The data collection for the classification purposes at the local detection phase is intended to mimic the network behavior rather than node behavior and the ability to infer the state of the node. A scheme based on obtaining datasets related to the packet counts for normal and malicious cases, collected using promiscuous mode, is adopted in the network. The local detection is conducted by the dedicated sniffers (DS) where each DS uses supervised learning approach based on decision trees to generate correctly classified instances (CCIs). The global stage collects the CCIs sent from the dedicated sniffers (DS) to the super node (SN) and applies an iterative linear regression to generate a time-based profile called the accumulated measure of fluctuation (AMoF) for malicious and normal nodes. A profile of a malicious and a normal node is obtained, and an anomaly is detected after three iterations (processed samples).\",\"PeriodicalId\":193359,\"journal\":{\"name\":\"2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAMICON.2018.8363921\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAMICON.2018.8363921","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 50

摘要

入侵检测系统在物联网领域具有重要的意义,因为其通信实体可以达到数千个节点。采用混合学习方法的入侵检测系统分为局部检测和全局检测两个阶段。在本地检测阶段,用于分类目的的数据收集旨在模拟网络行为,而不是节点行为和推断节点状态的能力。网络中采用了一种基于获取正常情况和恶意情况的数据包计数相关数据集的方案,该方案采用混杂模式采集。局部检测由专用嗅探器(DS)进行,每个嗅探器使用基于决策树的监督学习方法生成正确分类的实例(CCIs)。全局阶段收集从专用嗅探器(DS)发送到超级节点(SN)的cci,并应用迭代线性回归生成恶意节点和正常节点的基于时间的波动累积测度(AMoF)。得到一个恶意节点和一个正常节点的概要,经过三次迭代(处理后的样本)检测出异常。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cross layer-based intrusion detection based on network behavior for IoT
The intrusion detection systems gained major significance in the field of internet of things (IoT) as the communicating entities could reach thousands of nodes. An intrusion detection system (IDS) that uses a hybrid learning approach, consists of two stages of detection, local and global. The data collection for the classification purposes at the local detection phase is intended to mimic the network behavior rather than node behavior and the ability to infer the state of the node. A scheme based on obtaining datasets related to the packet counts for normal and malicious cases, collected using promiscuous mode, is adopted in the network. The local detection is conducted by the dedicated sniffers (DS) where each DS uses supervised learning approach based on decision trees to generate correctly classified instances (CCIs). The global stage collects the CCIs sent from the dedicated sniffers (DS) to the super node (SN) and applies an iterative linear regression to generate a time-based profile called the accumulated measure of fluctuation (AMoF) for malicious and normal nodes. A profile of a malicious and a normal node is obtained, and an anomaly is detected after three iterations (processed samples).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信