Araştırma Makalesi

Detection of RPL-based Routing Attacks Using Machine Learning Algorithms

Cilt: 15 Sayı: 4 23 Aralık 2024
PDF İndir
EN TR

Detection of RPL-based Routing Attacks Using Machine Learning Algorithms

Abstract

This study analyzes various machine learning techniques for detecting attacks against Routing Protocol for Low-Power and Lossy Networks (RPL), a routing protocol commonly used in Internet of Things (IoT) applications. RPL is often employed in IPv6-based IoT applications that require low power consumption and limited bandwidth. The research reviews recent literature examining attacks on RPL-based networks and utilizes the ROUT-4-2023 dataset for detecting routing attacks. This dataset, created using the Cooja simulator, encompasses four types of routing attacks: Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack. The attack types are detected using machine learning techniques like AdaBoost, KNN, Random Forest, Decision Tree, and Bagging. In the combined dataset, the Decision Tree and Bagging algorithm exhibited the highest performance with a 99.99% accuracy. To create a more accurate representation of the real world, we incorporate a 10% level of noise into the dataset. On the noisy dataset, Random Forest algorithm performed the best with about 84.80% accuracy. The high accuracy show that the employed methods can be effectively used as an Intrusion Detection System (IDS) to protect IoT networks. As a result, this study demonstrates that machine learning techniques offer a promising approach for detecting routing attacks in the RPL protocol. The findings provide useful information for researchers and practitioners in the field of IoT security. This study contributes to the potential of machine learning-based algorithms to enhance the security of IoT networks and contributes to future research in this area.

Keywords

Kaynakça

  1. [1] S. Görmüş, H. Aydın, and G. Ulutaş, “Security for the internet of things: a survey of existing mechanisms, protocols and open research issues,” Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 33, no. 4, pp. 1247–1272, 2018.
  2. [2] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: perspectives and challenges,” Wireless networks, vol. 20, pp. 2481 2501, 2014.
  3. [3] R. Alexander, A. Brandt, J. Vasseur, J. Hui, K. Pister, P. Thubert, P. Levis, R. Struik, R. Kelsey, and T. Winter, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” RFC 6550, Mar. 2012. [Online]. Available: editor.org/info/rfc6550 https://www.rfc
  4. [4] A. Verma and V. Ranga, “Machine learning based intrusion detection systems for iot applications,” Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, 2020.
  5. [5] T. Bekar, S. Görmüş, B. Aydın, and H. Aydın, “Q learning algorithm inspired objective function optimization for ietf 6tisch networks,” in 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), 2023, pp. 1–6.
  6. [6] M. EMEÇ and M. H. ÖZCANHAN, “Rout-4-2023: Rpl based routing attack dataset for iot,” 2023. [Online]. Available: https://dx.doi.org/10.21227/3mbe-5j70
  7. [7] H. Aydin, S. Goermues, and Y. Jin, “A distributed user authentication mechanism for ietf 6tisch protocol,” in 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018, pp. 1–7.
  8. [8] S. Külcü and S. Görmüş, “Improving synchronization time in 6tisch networks with smart antennas,” in 2022 30th Signal Processing and Communications Applications Conference (SIU). IEEE, 2022, pp. 1–4.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Makine Öğrenme (Diğer) , Elektronik, Sensörler ve Dijital Donanım (Diğer)

Bölüm

Araştırma Makalesi

Erken Görünüm Tarihi

23 Aralık 2024

Yayımlanma Tarihi

23 Aralık 2024

Gönderilme Tarihi

27 Mayıs 2024

Kabul Tarihi

25 Kasım 2024

Yayımlandığı Sayı

Yıl 2024 Cilt: 15 Sayı: 4

Kaynak Göster

IEEE
[1]B. Aydın, H. Aydın, S. Görmüş, ve E. Mollahasanoğlu, “Detection of RPL-based Routing Attacks Using Machine Learning Algorithms”, DÜMF MD, c. 15, sy 4, ss. 783–796, Ara. 2024, doi: 10.24012/dumf.1490367.
DUJE tarafından yayınlanan tüm makaleler, Creative Commons Atıf 4.0 Uluslararası Lisansı ile lisanslanmıştır. Bu, orijinal eser ve kaynağın uygun şekilde belirtilmesi koşuluyla, herkesin eseri kopyalamasına, yeniden dağıtmasına, yeniden düzenlemesine, iletmesine ve uyarlamasına izin verir. 24456