Proposal for a new architecture for detecting intrusion clusters in IoTs

  • Authors

    • Kanga Koffi Ecole Supérieure Africaine des TIC (ESATIC) https://orcid.org/0000-0002-5246-4304
    • BROU Aguié Pacôme Bertrand Doctor of Computer Science Teacher – researcher at ESATIC
    • Kamagaté Beman Hamidja Doctor in computer Science specializing in network and cybersecurity INPHB doctoral school, Teacher – researcher at ESATIC (Afri-can Higher School of ICT: Republic of Ivory Coast)
    2024-10-24
    https://doi.org/10.14419/j08qzt66
  • IoT Intrusion Detection Classification Algorithm; Dbscan; K-Means.
  • Abstract

    In this paper, we are proposing a new architecture to detect intrusions in an IoT environment. To achieve this, we reviewed the various works to our knowledge, relating to intrusions in IoT. As a contribution, our proposed architecture has 5 components (sensors - data storage - preprocessing and associated classification algorithms). Also To provide intelligence and evaluate the performance of our architecture, we initially implemented in our architecture the DBSCAN and K-means algorithms separately. Secondly, we proceeded with a hybridization of these algorithms (DBSCAN and K-means) . In terms of results, this hybridization allowed us to use DBSCAN to identify dense clusters of arbitrary form of data as well as intrusions in this data. As for K-means, it made it possible to refine the globular clusters found by DBSCAN in order to best detect and predict the sources of intrusion. These results show that our solution makes it possible to detect intrusions in IoTs in an efficient manner compared to the 2 algorithms (DBSSAN AND K-means) applied separately in our architecture.

  • References

    1. Dagorn, N. (2006). Détection et prévention d'intrusion: présentation et limites..
    2. https://inria.hal.science/inria-00084202/
    3. https://inria.hal.science/inria-00084202
    4. Kuwatly, I., Sraj, M., Al Masri, Z., & Artail, H. (2004, July). A dynamic honeypot design for intrusion detection. In The IEEE/ACS International Conference on Pervasive Services, 2004. ICPS 2004. Proceedings. (pp. 95-104). IEEE. https://doi.org/10.1109/PERSER.2004.1356776.
    5. Bhagat , N., & Arora , B. (2018, December ). Intrusion detection using honeypots . In 2018 Fifth International Conference on Parallel , Distributed and Grid Computing (PDGC) (pp. 412-417). IEEE. https://doi.org/10.1109/PDGC.2018.8745761.
    6. Depren , O., Topallar , M., Anarim , E., & Ciliz , MK (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert systems with Applications, 29(4), 713-722. https://doi.org/10.1016/j.eswa.2005.05.002.
    7. Guleria , D., & Chavan , M. K. (2012). A study and comparative analysis of conditional random fields for intrusion detection . Interna-tional Journal of Research in Computer Science, 2(4), 31-38. https://doi.org/10.7815/ijorcs.24.2012.037.
    8. Affinito , A., Zinno , S., Stanco , G., Botta, A., & Ventre, G. (2023). The evolution of Mirai botnet scans over a six- year period peri-od . Journal of Information Security and Applications, 79, 103629. https://doi.org/10.1016/j.jisa.2023.103629.
    9. Tournier, J., Lesueur, F., Le Mouël , F., Guyon, L., & Ben- Hassine , H. (2018, May). Audit of an IoT system by intrusion test. In RESSI 2018-Rendes-Vous de la Recherche et de l’Enseignement de l’Information Systems Security (pp. 1-3).
    10. Bouzoubaa , K., Taher , Y., & Nsiri , B. (2021). Predicting DOS-DDOS attacks : Review and evaluation study of features selection methods based on wrapper process . Int. J.Adv. Comput. Sci . Appl , 12(5), 132-145. https://doi.org/10.14569/IJACSA.2021.0120517.
    11. Kasinathan , P., Pastrone , C., Spirito , MA, & Vinkovits , M. (2013, October ). Denial -of-Service detection in 6LoWPAN based Inter-net of Things . In 2013 IEEE 9th international conference on wireless and mobile computing , networking and communications ( WiMob ) (pp. 600-607). IEEE. https://doi.org/10.1109/WiMOB.2013.6673419.
    12. Jun, C., & Chi, C. (2014, January ). Design of complex event-processing IDS in internet of things . In 2014 sixth international confer-ence on measurement technology and mechatronics automation (pp. 226-229). IEEE. https://doi.org/10.1109/ICMTMA.2014.57.
    13. Surendar , M., & Umamakeswari , A. (2016, March). InDReS : An Intrusion Detection and response system for Internet of Things with 6LoWPAN. In 2016 International Conference on Wireless Communications, Signal Processing and Networking ( WiSPNET ) (pp. 1903-1908). IEEE. https://doi.org/10.1109/WiSPNET.2016.7566473.
    14. Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., & Atkinson, R. (2017). Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145.
    15. Nobakht , M. (2019). The internet of things : securing devices and user data (Doctoral dissertation, UNSW Sydney).
    16. Nobakht , M., Sivaraman , V., & Boreli , R. (2016, August). A host- based intrusion detection and mitigation framework for smart home IoT using OpenFlow . In 2016 11th International conference on availability , reliability and security (ARES) (pp. 147-156). IEEE. https://doi.org/10.1109/ARES.2016.64.
  • Downloads

  • How to Cite

    Koffi, K., Aguié Pacôme Bertrand , B. ., & Beman Hamidja , K. . (2024). Proposal for a new architecture for detecting intrusion clusters in IoTs. International Journal of Engineering & Technology, 13(2), 341-350. https://doi.org/10.14419/j08qzt66