An Implementation of Effective Machine Learning Approaches to Perform Sybil Attack Detection (SAD) in IoT Network

Authors

  • Hafiz Burhan ul Haq Department of Information Technology, Faculty of Computer Sciences, Lahore Garrison University, Lahore 54000, Pakistan Author
  • Muhammad Saqlain Departments of Mathematics, Faculty of Science, King Mongkut’s University of Technology Thonburi (KMUTT), Bangkok 10140, Thailand Author

DOI:

https://doi.org/10.31181/taci1120232

Keywords:

Contiki-Cooja, Sybil Attack, IDS, Security

Abstract

The rapid expansion of the technology industry has resulted in the emergence of a number of new areas of research, one of which is known as "intrusion detection." The objective of an Intrusion Detection System, often known as an IDS, is to categorize user behaviors as either benign or malicious, and then to notify the relevant parties in accordance with this classification. However, a variety of strategies for attack detection have been developed, such as the Sybil attack; however, present techniques are restricted to concentrating on both aspects simultaneously because to constraints in detection accuracy and energy consumption. One such strategy is the Sybil attack. In order to circumvent these restrictions, a framework for the detection of Sybil attacks that is more effective in terms of detection accuracy (security) and energy usage (power) has been presented. Nevertheless, the suggested structure is simple, uncomplicated to understand, and does not need any computing requirements. In this particular architecture, in addition to the Cooja-Contiki simulator, three distinct machine learning methods are used. The NSL-KDD dataset is used in order to test the performance of the proposed framework. This dataset attained the maximum accuracy possible, which was 99.1s%. In addition, in this study, a comparison examination of the suggested work with an existing technique that is considered to be state-of-the-art is carried out in order to determine whether approach is more effective.

Downloads

Download data is not yet available.

References

Saraswathi, R. V., Sree, L. P., & Anuradha, K. (2016). Dynamic and probabilistic key management for distributed wireless sensor networks. In 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1-6. IEEE. https://doi.org/10.1109/ICCIC.2016.7919666.

Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance evaluation of RPL protocol under mobile sybil attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS, 049-1055. IEEE. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.351.

Rahbari, M., & Jamali, M. A. J. (2011). Efficient detection of Sybil attack based on cryptography in VANET. International Journal of Network Security & its Applications, 3(6). https://doi.org/10.48550/arXiv.1112.2257.

NSL-KDD Dataset [Online]. https://www.unb.ca/cic/datasets/nsl.html.

Revathi, S., & Malathi, A. (2013). A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research & Technology, 2(12), 1848-1853.

Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2018). Deep recurrent neural network for intrusion detection in sdn-based networks. In 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft) (pp. 202-206). IEEE. https://doi.org/10.1109/NETSOFT.2018.8460090.

Kurochkin, I. I., & Volkov, S. S. (2020). Using GRU based deep neural network for intrusion detection in software-defined networks. In IOP Conference Series: Materials Science and Engineering, 927(1), 012035. IOP Publishing. https://doi.org/10.1088/1757-899X/927/1/012035.

Hadi, M. R., & Mohammed, A. S. (2022). A novel approach to network intrusion detection system using deep learning for Sdn: Futuristic approach. arXiv preprint arXiv:2208.02094. https://doi.org/10.5121/csit.2022.121106.

Azam, S., Bibi, M., Riaz, R., Rizvi, S. S., & Kwon, S. J. (2022). Collaborative learning based Sybil attack detection in Vehicular AD-HOC Networks (VANETS). Sensors, 22(18), 6934. https://doi.org/10.3390/s22186934.

Murali, S., & Jamalipour, A. (2019). A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal, 7(1), 379-388. https://doi.org/10.1109/JIOT.2019.2948149.

Murali, S., & Jamalipour, A. (2018). Mobility-aware energy-efficient parent selection algorithm for low power and lossy networks. IEEE Internet of Things Journal, 6(2), 2593-2601. https://doi.org/10.1109/JIOT.2018.2872443.

Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2018). Analytical model for Sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), 379-387. https://doi.org/10.1109/JIOT.2018.2843769.

Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860-876. https://doi.org/10.1016/j.future.2018.03.021.

Shreenivas, D., Raza, S., & Voigt, T. (2017). Intrusion detection in the RPLconnected 6LoWPAN networks. In Proc. 3rd ACM Int. Workshop IoT Privacy Trust Security (IoTPTS), Abu Dhabi, UAE, 2017, pp. 31-38.

Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840-847. https://doi.org/10.1016/j.promfg.2019.02.292.

Singhal, P., Sharma, P., & Arora, D. (2018). An approach towards preventing IoT based Sybil attack based on contiki framework through cooja simulator. International Journal of Engineering & Technology, 7(2.8), 261-267.

Rohan, V. (2022). Gaussian Naive Bayes: What You Need to Know?

Gaussian Naive Bayes. https://iq.opengenus.org/gaussian-naive-bayes/.

Shriram. (2023). Multinomial Naive Bayes Explained: Function, Advantages & Disadvantages, Applications in 2023.

Dan, N. (2023). Gradient Boosting Classifiers in Python with Scikit-Learn.

Debomit, D. (2023). Bagging classifier.

Moamen, E. (2022). What is Bagging classifier.

Published

2023-08-23

How to Cite

ul Haq, H. B., & Saqlain, M. (2023). An Implementation of Effective Machine Learning Approaches to Perform Sybil Attack Detection (SAD) in IoT Network. Theoretical and Applied Computational Intelligence , 1(1), 1-14. https://doi.org/10.31181/taci1120232