Research Article

Decision Tree Based Intrusion Detection Method in the Internet of Things

Volume: 6 Number: 1 June 28, 2022
EN TR

Decision Tree Based Intrusion Detection Method in the Internet of Things

Abstract

Developments in computer and network technologies have also positively affected internet technology. With the development of the Internet, the concept of IoT (Internet of Things) has been invented. Nowadays, IoT devices provide convenience in many areas, and the positive effects of IoT-based systems increase people's quality of life. People want to remotely monitor and manage smart cities, smart homes, and other platforms. However, IoT systems have many vulnerabilities and thus have become the target of attackers. Detecting such attacks and preventing security vulnerabilities will further increase the rate of use of IoT technology. In this work, an intelligent intrusion detection system (IDS) for IoT devices has been suggested. The presented intelligent IDS for IoT devices have been developed on a big attack dataset and this dataset contains 3,668,443 observations. In prior works which used this dataset, researchers worked on a binary classification problem (attacked and normal). However, this research aims to classify the attack types, hence, nine categories have been used. In order to propose a prompt responded IDS model, a fast classifier which is a decision tree (DT) has been employed. Our proposal attained 97.43% classification accuracy on this dataset using 10-fold cross-validation. This accuracy rate frankly demonstrates the classification ability of our proposed IDS model for IoT devices.

Keywords

Decision tree, Intrusion detection, Internet of Things, DDoS, DoS

References

  1. F. Ertam, I. F. Kilincer, O. Yaman, and A. Sengur, “A New IoT Application for Dynamic WiFi based Wireless Sensor Network,” 2020 Int. Conf. Electr. Eng. ICEE 2020, pp. 6–9, 2020, doi: 10.1109/ICEE49691.2020.9249771.
  2. M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things, vol. 7, p. 100059, Sep. 2019, doi: 10.1016/j.iot.2019.100059.
  3. S. D. Okegbile and O. I. Ogunranti, “Users emulation attack management in the massive internet of things enabled environment,” ICT Express, vol. 6, no. 4, pp. 353–356, Dec. 2020, doi: 10.1016/j.icte.2020.06.005.
  4. J. Ashraf et al., “IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities,” Sustain. Cities Soc., vol. 72, no. May, p. 103041, 2021, doi: 10.1016/j.scs.2021.103041.
  5. “IoT Anaytics,” IoT Analytics - Market insights for the Internet of Things. https://iot-analytics.com/ (accessed Jun. 02, 2021).
  6. K. Gupta and S. Shukla, “Internet of Things: Security challenges for next generation networks,” in 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, Aug. 2016, pp. 315–318, doi: 10.1109/ICICCS.2016.7542301.
  7. P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. H. Ha, “Anonymous Secure Framework in Connected Smart Home Environments,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 4, pp. 968–979, Apr. 2017, doi: 10.1109/TIFS.2016.2647225.
  8. E. Deniz, “Nesnelerin İnternetinde Gizlilik Ve Güvenlik Yönetimi, Yüksek Lisans Tezi, Ankara Üniversitesi,” Ankara, 2019.
  9. G. D’Angelo, F. Palmieri, M. Ficco, and S. Rampone, “An uncertainty-managing batch relevance-based approach to network anomaly detection,” Appl. Soft Comput. J., vol. 36, pp. 408–418, 2015, doi: 10.1016/j.asoc.2015.07.029.
  10. M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, “A survey of network-based intrusion detection data sets,” Comput. Secur., vol. 86, pp. 147–167, 2019, doi: 10.1016/j.cose.2019.06.005.
APA
Tekin, R., Yaman, O., & Tuncer, T. (2022). Decision Tree Based Intrusion Detection Method in the Internet of Things. International Journal of Innovative Engineering Applications, 6(1), 17-23. https://doi.org/10.46460/ijiea.970383
AMA
1.Tekin R, Yaman O, Tuncer T. Decision Tree Based Intrusion Detection Method in the Internet of Things. IJIEA. 2022;6(1):17-23. doi:10.46460/ijiea.970383
Chicago
Tekin, Rojbin, Orhan Yaman, and Türker Tuncer. 2022. “Decision Tree Based Intrusion Detection Method in the Internet of Things”. International Journal of Innovative Engineering Applications 6 (1): 17-23. https://doi.org/10.46460/ijiea.970383.
EndNote
Tekin R, Yaman O, Tuncer T (June 1, 2022) Decision Tree Based Intrusion Detection Method in the Internet of Things. International Journal of Innovative Engineering Applications 6 1 17–23.
IEEE
[1]R. Tekin, O. Yaman, and T. Tuncer, “Decision Tree Based Intrusion Detection Method in the Internet of Things”, IJIEA, vol. 6, no. 1, pp. 17–23, June 2022, doi: 10.46460/ijiea.970383.
ISNAD
Tekin, Rojbin - Yaman, Orhan - Tuncer, Türker. “Decision Tree Based Intrusion Detection Method in the Internet of Things”. International Journal of Innovative Engineering Applications 6/1 (June 1, 2022): 17-23. https://doi.org/10.46460/ijiea.970383.
JAMA
1.Tekin R, Yaman O, Tuncer T. Decision Tree Based Intrusion Detection Method in the Internet of Things. IJIEA. 2022;6:17–23.
MLA
Tekin, Rojbin, et al. “Decision Tree Based Intrusion Detection Method in the Internet of Things”. International Journal of Innovative Engineering Applications, vol. 6, no. 1, June 2022, pp. 17-23, doi:10.46460/ijiea.970383.
Vancouver
1.Rojbin Tekin, Orhan Yaman, Türker Tuncer. Decision Tree Based Intrusion Detection Method in the Internet of Things. IJIEA. 2022 Jun. 1;6(1):17-23. doi:10.46460/ijiea.970383