A Survey: Intrusion Detection Techniques for Internet of Things

A Survey: Intrusion Detection Techniques for Internet of Things

Sarika Choudhary, Nishtha Kesswani
Copyright: © 2019 |Pages: 20
DOI: 10.4018/IJISP.2019010107
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.
Article Preview
Top

Intrusion Detection System

Intrusion is an unnecessary or malicious activity which is dangerous to sensor nodes. Intrusion Detection System is used to observe the malicious traffic in a network. It can act as a second line of defense which can defend the network from intruders (Alrajeh et al., 2013). IDS can be a software or hardware tool. IDS can examine and investigate machines and user actions, detect signatures of well-known attacks and categorize malicious network activity.

The goal of IDS is to monitor the networks and nodes, detect various intrusions in the network, and alert the users about intrusions. The IDS works as an alarm or network observer, it avoids damage of the systems by generating an alert before the attackers initiate an attack. It can detect both internal and external attacks. Internal attacks are initiated by malicious or compromised nodes that are the part of the network while external attacks are launched by third parties who are initiated by outside network. IDS detect the network packets and determine whether they are intruders or legitimate users. Three components of ID include: Monitoring, Analysis and detection, Alarm (Alrajeh et al., 2013). The monitoring component monitors the network traffics, patterns and resources. Analysis and Detection is a core module of IDS which detects the intrusions according to specified algorithm. Alarm section raises an alarm if intrusion is detected (Thakur & Sanyal, 2012).

Types of IDS

There are basically three types of IDS based on their behavior shown in Figure 1. Here we are going to explain IDS based on their analysis strategy. These are following:

  • Signature based: It is also known as rule-based detection technique. It matches the present profile of the network with the pre-defined stored attack patterns (Amaral et al., 2014).

  • Anomaly based: It is also known as event-based detection technique. It defines the regular behavior of the network and if some activity founds diverges from the normal behavior then it is marked as an intrusion (Amaral et al., 2014).

  • Specification based: It is like anomaly detection technique. In this, normal activities of the network are defined physically by user and then if any malicious activity is found then it raises alarm. It is more time consuming than anomaly technique (Amaral et al., 2014).

Figure 1.

Classification of intrusion detection system based on their behavior

IJISP.2019010107.f01

The rest of paper is organized as follows: Section II discusses the three layer architecture of IoT and describes each layer. Section III discuss the different types of cyber-attacks on IoT protocols such as RPL and 6LoWPAN, this section also includes some mitigation techniques for attacks. Section IV is Literature Survey on different IDS techniques to find out the various kinds of attacks in Internet of Things network. Section V concludes the paper and Section VI gives future scope and some research directions to researchers.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing