A Novel IDS System based on Hedge Algebras to Detect DDOS Attack in IoT Systems
Author affiliations
DOI:
https://doi.org/10.15625/2525-2518/18233Keywords:
Internet of Things, Intrusion Detection System, DDOS, hedge algebra, PSO algorithmAbstract
In recent years, we have experienced IoT solutions' rapid and beneficial development throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues. The DDOS attack, which originates from a broad range of sources and is a significant challenge for IoT systems, is one of the most prevalent but devastating attacks. IoT devices are typically simple and have few computing resources, which puts them at risk of being infected and attackers. IDS intrusion detection systems are considered superior protection against DDOS attacks. Therefore, the IDS system attracts many researchers and implements intelligent techniques such as machine learning and fuzzy logic to detect these DDOS attacks quickly and precisely. Along with the approach of intelligent computation, this study presents a novel technique for detecting DDOS attacks based on hedge algebra, which has never been implemented on IDS systems. We use the PSO swarm optimization algorithm to optimize the proposed model's parameters for optimized performance. Our experiment on the IoT-23 dataset shows that the proposed model's accuracy and performance metrics for DDOS attack detection are better than those proposed by other previous authors.
Downloads
References
Khanna A. and Kaur S. - Internet of things (IoT), applications and challenges: a comprehensive review, Wireless Personal Communications 114 (2) (2020) 1687-176. DOI: https://doi.org/10.1007/s11277-020-07446-4
Jayashree M., Mishra S., Patra S., Pati B., and Panigrahi C. R. - IoT security, challenges, and solutions: a review, Progress in Advanced Computing and Intelligent Engineering, 2021, pp. 493-504. DOI: https://doi.org/10.1007/978-981-15-6353-9_46
Ruchi V. and Jain A. K. - A survey of DdoS attacking techniques and defense mechanisms in the IoT network, Telecommunication systems 73 (1) (2020) 3-25. DOI: https://doi.org/10.1007/s11235-019-00599-z
Mohammed S. M., Rathore S., and Park J. H. - Distributed denial of service attacks and its defenses in IoT: a survey, The Journal of Supercomputing 76 (7) (2020) 5320-5363. DOI: https://doi.org/10.1007/s11227-019-02945-z
Markus R., Wunderlich S., Scheuring D., Landes D., and Hotho A. - A survey of network-based intrusion detection data sets, Computers and Security 86 (2019) 147-167. DOI: https://doi.org/10.1016/j.cose.2019.06.005
Gilberto F., Rodrigues J., Carvalho L. F., Al-Muhtadi J. F., and Proenca M. L. - A comprehensive survey on network anomaly detection, Telecommunication Systems 70 (3) (2019) 447-489. DOI: https://doi.org/10.1007/s11235-018-0475-8
Ankit T., and Lohiya R. - A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges, Archives of Computational Methods in Engineering 28 (4) (2021) 3211-3243. DOI: https://doi.org/10.1007/s11831-020-09496-0
Mendonca P., Robson V., Teodoro A., Rosa R. L., Saadi M., Melgarejo D. C., Nardelli P., and Rodrıguez D. R. - Intrusion detection system based on fast hierarchical deep convolutional neural network, IEEE Access 9 (2021) 61024-61034. DOI: https://doi.org/10.1109/ACCESS.2021.3074664
Rasheed A., and Alsmadi I. - Machine learning approaches to IoT security: A systematic literature review, Internet of Things 14 (2021) 100365. DOI: https://doi.org/10.1016/j.iot.2021.100365
Mohammed M., and Al-sultan G. A. - Network intrusion detection system using deep neural networks, In Journal of Physics: Conference Series 1804 (1) (2021) 012138. DOI: https://doi.org/10.1088/1742-6596/1804/1/012138
Amjad A., Sampalli S., and Bodorik P. - DdoS detection system: Using a set of classification algorithms controlled by the fuzzy logic system in Apache spark, IEEE Transactions on Network and Service Management 16 (3) (2019) 936-949. DOI: https://doi.org/10.1109/TNSM.2019.2929425
Mohammad M., and Khezri H. - Towards fuzzy anomaly detection-based security: a comprehensive review, Fuzzy Optimization and Decision Making 20 (1) (2021) 1-49. DOI: https://doi.org/10.1007/s10700-020-09332-x
Tohid J., Masdari M., Ghaffari A., and Majidzadeh K. - A survey and classification of the security anomaly detection mechanisms in software-defined networks, Cluster Computing 24 (2) (2021) 1235-1253. DOI: https://doi.org/10.1007/s10586-020-03184-1
Pajouh H., Dehghantanha H. A., Parizi R. M., Aledhari M., and Karimipour H. - A survey on Internet of things security: Requirements, challenges, and solutions. Internet of Things 14 (2021) 100129. DOI: https://doi.org/10.1016/j.iot.2019.100129
Parmisano A., Garcia S., and Erquiaga M. J. - A labeled dataset with malicious and benign IoT network traffic. https://www.stratosphereips.org/datasets-IoT-23.
Stoian N. A. - Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set. Bachelor's thesis, University of Twente, 2020.
Imtiaz U., Ullah A., and Sajjad M. - Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks, Internet of Things 2 (3) (2021) 428-448. DOI: https://doi.org/10.3390/iot2030022
Imtiaz U., and Mahmoud Q. H. - Design and development of a deep learning-based model for anomaly detection in IoT networks, IEEE Access 9 (2021) 103906-103926. DOI: https://doi.org/10.1109/ACCESS.2021.3094024
Rameem Z. S., and Chishti M. A. - A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic and fog-based approach, Neural Computing and Applications 34 (9) (2022) 6927-6952. DOI: https://doi.org/10.1007/s00521-021-06823-9
Mohammad A., Al-Sawwa J., and Alkasassbeh M. - Anomaly-based intrusion detection system using fuzzy logic, In 2021 IEEE International Conference on Information Technology (ICIT), 2021, pp. 290-295.
Nguyen V. T., Nguyen T. X., Hoang T. M., and Vu N. L. - A new anomaly traffic detection based on a fuzzy logic approach in wireless sensor networks, In Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019, pp. 205-209. DOI: https://doi.org/10.1145/3368926.3369714
Hoang T. M. - A Study on Anomaly Data Traffic Detection Method for Wireless Sensor Networks, In The International Conference on Intelligent Systems & Networks, 2021, pp. 429-436. DOI: https://doi.org/10.1007/978-981-16-2094-2_52
Ho N. C., and Wechsler W. - Hedge algebras: an algebraic approach to the structure of sets of linguistic truth values, Fuzzy sets and systems 35 (3) (1990) 281-293. DOI: https://doi.org/10.1016/0165-0114(90)90002-N
Ngo H. H., Ho N. C., and Nguyen V. Q. - Multichannel image contrast enhancement based on linguistic rule-based intensification, Applied Soft Computing 76 (2019) 744-762. DOI: https://doi.org/10.1016/j.asoc.2018.12.034
Hoang T., Nguyen T., Vu N., and Nguyen H. - A Novel Fuzzy Inference System Based on Hedge Algebras to Enhance Energy Efficiency in Wireless Sensor Networks, 2018 IEEE 3rd International Conference on Communication and Information Systems (ICCIS), 2018, pp. 73-78. DOI: https://doi.org/10.1109/ICOMIS.2018.8644986
Shami T. M., El-Saleh A. A., Alswaitti M., Al-Tashi Q., Summakieh M. A., and Mirjalili S. - Particle Swarm Optimization: A Comprehensive Survey, In IEEE Access 10 (2022) 10031-10061. DOI: https://doi.org/10.1109/ACCESS.2022.3142859
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Vietnam Journal of Sciences and Technology (VJST) is an open access and peer-reviewed journal. All academic publications could be made free to read and downloaded for everyone. In addition, articles are published under term of the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA) Licence which permits use, distribution and reproduction in any medium, provided the original work is properly cited & ShareAlike terms followed.
Copyright on any research article published in VJST is retained by the respective author(s), without restrictions. Authors grant VAST Journals System a license to publish the article and identify itself as the original publisher. Upon author(s) by giving permission to VJST either via VJST journal portal or other channel to publish their research work in VJST agrees to all the terms and conditions of https://creativecommons.org/licenses/by-sa/4.0/ License and terms & condition set by VJST.
Authors have the responsibility of to secure all necessary copyright permissions for the use of 3rd-party materials in their manuscript.