Skip to main content

Advertisement

Log in

Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is the powerful latest trend that allows communications and networking of many sources over the internet. The routing protocol for low power and lossy networks (RPL) based IoT may be exposed to many routing attacks due to resource-constrained and open nature of the IoT nodes. Hence, there is a need for network intrusion detection system (NIDS) to protect RPL based IoT networks from routing attacks. The existing techniques for anomaly-based NIDS (ANIDS) subjects to high false alarm rate (FAR). To overcome this issue, a novel bio-inspired voting ensemble classifier with feature selection technique is proposed in this paper to improve the performance of ANIDS for RPL based IoT networks. Initially, the dataset is preprocessed in three steps like cleaning, encoding and normalization. Though the dataset is imbalanced, a common method called SMOTE is applied to balance the dataset. Then feature selection is performed with hybrid approach of simulated annealing and improved Salp Swarm Optimization (SA-ISSA) to minimize the computational complexity by considering only the best features from the entire dataset. The proposed voting classifier is the ensemble of machine learning based classifiers namely decision tree (DT), logistic regression (LR), K-nearest neighbor (KNN), support vector machine (SVM) and a deep learning-based classifier called bidirectional long short-term memory (Bi-LSTM). The weights of all these classifiers are optimized using hybrid approach of Particle Swarm Optimization and improved Salp Swarm Optimization (PSO-ISSA) to achieve higher attack detection rate (ADR). Thus the proposed approach can handle high FAR, imbalanced dataset and high computation cost. The performance of the proposed feature selection and classification approaches are evaluated and compared with existing methods in terms of accuracy, ADR, FAR and so on. The experiments are performed with RPL-NIDDS17 dataset that contains seven types of attack instances. The proposed ensemble classifier shows better performance with higher accuracy (96.4%), ADR (97.7%) and reduced FAR (3.6%).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

Enquiries about data availability should be directed to the authors.

References

  1. Verma, A., & Ranga, V. (2019). ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things. In 2019 4th international conference on Internet of Things: Smart innovation and usages (IoT-SIU). https://doi.org/10.1109/iot-siu.2019.8777504

  2. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN networks in the Internet of Things: A review. IEEE Sensors Journal. https://doi.org/10.1109/jsen.2020.2973677

    Article  Google Scholar 

  3. Winter, T. (2012). Rpl: Ipv6 routing protocol for low-power and Lossy networks. https://tools.ietf.org/html/rfc6550

  4. Verma, A., & Ranga, V. (2019). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications, 108, 1571–1594. https://doi.org/10.1007/s11277-019-06485-w

    Article  Google Scholar 

  5. Pasikhani, A. M., Clark, J. A., Gope, P., & Alshahrani, A. (2021). Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review. IEEE Sensors Journal, 21(11), 12940–12968. https://doi.org/10.1109/JSEN.2021.3068240

    Article  Google Scholar 

  6. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287–2310. https://doi.org/10.1007/s11277-019-06986-8

    Article  Google Scholar 

  7. Tama, B. A., Comuzzi, M., & Rhee, K.-H. (2019). TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access. https://doi.org/10.1109/access.2019.2928048

    Article  Google Scholar 

  8. Cakir, S., Toklu, S., & Yalcin, N. (2020). RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning. IEEE Access, 8, 183678–183689. https://doi.org/10.1109/ACCESS.2020.3029191

    Article  Google Scholar 

  9. Yavuz, F. Y., Ünal, D., & Gül, E. (2018). Deep learning for detection of routing attacks in the Internet of Things. The International Journal of Computational Intelligence Systems, 12(1), 39–58.

    Article  Google Scholar 

  10. Yang, J., Sheng, Y., & Wang, J. (2020). A GBDT-paralleled quadratic ensemble learning for intrusion detection system. IEEE Access, 8, 175467–175482. https://doi.org/10.1109/access.2020.3026044

    Article  Google Scholar 

  11. Bhati, B. S., Rai, C. S., Balamurugan, B., & Al-Turjman, F. (2020). An intrusion detection scheme based on the ensemble of discriminant classifiers. Computers & Electrical Engineering, 86, 106742. https://doi.org/10.1016/j.compeleceng.2020.106742

    Article  Google Scholar 

  12. El-kenawy, E.-S.M., Ibrahim, A., Mirjalili, S., Eid, M. M., & Hussein, S. E. (2020). Novel feature selection and voting classifier algorithms for COVID-19 classification in CT Images. IEEE Access. https://doi.org/10.1109/access.2020.3028012

    Article  Google Scholar 

  13. Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581–5609. https://doi.org/10.1007/s12652-020-01919-x

    Article  Google Scholar 

  14. Zhao, X., Yang, F., Han, Y., & Cui, Y. (2020). An Opposition-based chaotic Salp swarm algorithm for global optimization. IEEE Access. https://doi.org/10.1109/access.2020.2976101

    Article  Google Scholar 

  15. Verma, A., & Ranga, V. (2018). RPL-NIDDS17—a data set for intrusion detection in RPL based 6LoWPAN networks (Internet of Things). 10.5281/zenodo.1406034

  16. Feng, W., Dauphin, G., Huang, W., Quan, Y., Bao, W., Wu, M., & Li, Q. (2019). Dynamic synthetic minority over-sampling technique-based rotation forest for the classification of imbalanced hyperspectral data. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing. https://doi.org/10.1109/jstars.2019.2922297

    Article  Google Scholar 

  17. Tubishat, M., Idris, N., Shuib, L., Abushariah, M. A. M., & Mirjalili, S. (2019). Improved Salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Systems with Applications. https://doi.org/10.1016/j.eswa.2019.113122

    Article  Google Scholar 

  18. Al-Abassi, A., Karimipour, H., Dehghantanha, A., & Parizi, R. M. (2020). An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access. https://doi.org/10.1109/access.2020.2992249

    Article  Google Scholar 

  19. Shahraki, A., Abbasi, M., & Haugen, Ø. (2020). Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Engineering Applications of Artificial Intelligence, 94, 103770. https://doi.org/10.1016/j.engappai.2020.103770

    Article  Google Scholar 

  20. Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7, 105. https://doi.org/10.1186/s40537-020-00379-6

    Article  Google Scholar 

  21. Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier. Computer Networks. https://doi.org/10.1016/j.comnet.2020.107247

    Article  Google Scholar 

  22. Asadi, M., Jamali, M. A. J., Parsa, S., & Majidnezhad, V. (2020). Detecting botnet by using particle swarm optimization algorithm based on voting system. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2020.01.055

    Article  Google Scholar 

  23. Kumar, P., Gupta, G. P., & Tripathi, R. (2021). An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Computer Communications, 166, 110–124. https://doi.org/10.1016/j.comcom.2020.12.003

    Article  Google Scholar 

  24. Pu, C. (2020). Sybil attack in RPL-based Internet of Things: Analysis and defenses. IEEE Internet of Things Journal. https://doi.org/10.1109/jiot.2020.2971463

    Article  Google Scholar 

  25. Murali, S., & Jamalipour, A. (2019). A lightweight intrusion detection for Sybil attack under mobile RPL in the Internet of Things. IEEE Internet of Things Journal. https://doi.org/10.1109/jiot.2019.2948149

    Article  Google Scholar 

  26. Gothawal, D. B., & Nagaraj, S. V. (2020). Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wireless Personal Communications, 110, 1323–1344. https://doi.org/10.1007/s11277-019-06789-x

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Jaya Prakash.

Ethics declarations

Conflict of interest

The authors whose names are listed immediately below certify that they have NO affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prakash, P.J., Lalitha, B. Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things. Wireless Pers Commun 125, 3603–3626 (2022). https://doi.org/10.1007/s11277-022-09726-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09726-7

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy