Skip to main content
Log in

Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In recent decades, the internet of things (IoT) is a growing technology in smart applications, where it is highly susceptible to security breaches, due to the resource constrained nature of IoT. Among the available security breaches in IoT, Mirai, denial of service, user to root attack, remote to local attack, and probe attack renounce the networks in several ways such as saturating link bandwidth, consumption of server resources, etc. Hence, the installation of antivirus software cannot be guaranteed, because the IoT devices are equipped only with light weighted operating systems. So, intrusion detection systems are developed for the detection of IoT attacks. In this research, a new model is proposed based on random forest and synthetic minority over-sampling technique (RF-SMOTE) to detect the attacks in an IoT network. In this research, the experimental analysis is performed for IoT attack detection, where the evaluation is done on NSL-KDD dataset and network-based detection of IoT (N-BaIoT) dataset, which are the well-known datasets for IoT attack detection. In the experimental phase, the proposed RF-SMOTE model showed minimum of 0.14% and maximum of 14.25% improvement in accuracy on NSL-KDD dataset for binary class. In addition, the proposed model averagely showed minimum of 0.04% and maximum of 7.35% improvement in accuracy on NSL-KDD dataset for four classes. Additionally, the proposed RF-SMOTE model showed minimum of 0.01% and maximum of 0.04% improvement in accuracy on N-BaIoT dataset related to the existing model’s decision tree, shallow model, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Al-Duwairi B, Al-Kahla W, AlRefai MA, Abdelqader Y, Rawash A, Fahmawi R (2020) SIEM-based detection and mitigation of IoT-botnet DDoS attacks. Int J Electr Comput Eng 10:2088–8708

    Google Scholar 

  • Alharbi A, Alhaidari S, Zohdy M (2018) Denial-of-service, probing, user to root (U2R) & remote to user (R2L) attack detection using hidden Markov models. Int J Comput Inf Technol

  • Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031

    Article  Google Scholar 

  • Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357

    Article  Google Scholar 

  • Cvitic I, Peraković D, Periša M, Botica M (2019) Novel approach for detection of IoT generated DDoS traffic. Wirel Netw 1–14. https://doi.org/10.1007/s11276-019-02043-1

  • Davahli A, Shamsi M, Abaei G (2020) Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J Ambient Intell Humaniz Comput 11(11):5581–5609.

    Article  Google Scholar 

  • De Donno M, Dragoni N, Giaretta A, Mazzara M (2016) AntibIoTic: protecting IoT devices against DDoS attacks. In: International conference in software engineering for defence applications, Springer, Cham, pp 59–72

  • Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768

    Article  Google Scholar 

  • Hassan NY, Gomaa WH, Khoriba GA, Haggag MH (2018) Supervised learning approach for twitter credibility detection. In: 2018 13th International conference on computer engineering and systems (ICCES), pp 196–201

  • Hu JW, Yeh LY, Liao SW, Yang CS (2019) Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices. Comput Secur 86:238–252

    Article  Google Scholar 

  • Kumar U, Navaneet S, Kumar N, Pandey SC (2020) Isolation of DDoS attack in IoT: A New Perspective. Wirel Pers Commun 114:2493–2510

    Article  Google Scholar 

  • Li J, Liu M, Xue Z, Fan X, He X (2020) RTVD: a real-time volumetric detection scheme for DDoS in the Internet of Things. IEEE Access 8:36191–36201

    Article  Google Scholar 

  • Liu G, Quan W, Cheng N, Zhang H, Yu S (2019) Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things. J Netw Comput Appl 30:1–13

    Article  Google Scholar 

  • Mallikarjunan KN, Bhuvaneshwaran A, Sundarakantham K, Shalinie SM (2019) DDAM: detecting DDoS attacks using machine learning approach. In: Computational intelligence: theories, applications and future directions-volume I. Springer, Singapore, pp 261–273

  • Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM (2018) NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. J Supercomput 74:5156–5170

    Article  Google Scholar 

  • Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput 17:12–22

    Article  Google Scholar 

  • Osanaiye O, Cai H, Choo KKR, Dehghantanha A, Xu Z, Dlodlo M (2016) Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J Wirel Commun Netw 2016:130

    Article  Google Scholar 

  • Panda S, Panda G (2020) Intelligent classification of IoT traffic in healthcare using machine learning techniques. In: International conference on control, automation and robotics (ICCAR), pp 581–585

  • Park ST, Li G, Hong JC (2020) A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. J Ambient Intell Humaniz Comput 11(4):1405–1412

    Article  Google Scholar 

  • Quackenbush J (2002) Microarray data normalization and transformation. Nat Genet 32:496–501

    Article  Google Scholar 

  • Ravi N, Shalinie SM (2020a) Semi-supervised learning based security to detect and mitigate intrusions in IoT network. IEEE Internet Things J 7(11):11041–11052

    Article  Google Scholar 

  • Ravi N, Shalinie SM (2020b) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7:3559–3570

    Article  Google Scholar 

  • Roopak M, Tian GY, Chambers J (2020) Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw 9:120–127

    Article  Google Scholar 

  • Sathyaraj P, Devi DR (2020) Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J Ambient Intell Humaniz Comput 1–9. https://doi.org/10.1007/s12652-020-02358-4

  • Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, IEEE, pp 1–6

  • Tuan TA, Long HV, Kumar R, Priyadarshini I, Son NTK (2019) Performance evaluation of Botnet DDoS attack detection using machine learning. Evol Intell 1–12. https://doi.org/10.1007/s12065-019-00310-w

  • Van den Broeck J, Cunningham SA, Eeckels R, Herbst K (2005) Data cleaning: detecting, diagnosing, and editing data abnormalities. PLoS Med 2:e267

    Article  Google Scholar 

  • Wani A, Revathi S (2020) DDoS detection and alleviation in IoT using SDN (SDIoT-DDoS-DA). J Inst Eng India Ser B 101:117–128

    Article  Google Scholar 

  • Yin D, Zhang L, Yang K (2018) A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6:24694–24705

    Article  Google Scholar 

  • Zhang X, Xie L, Yao W (2020) Spatio-temporal heterogeneous bandwidth allocation mechanism against DDoS attack. J Netw Comput Appl 162:102658

    Article  Google Scholar 

Download references

Funding

We haven’t received any funding from any sources.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Ganesh Karthik.

Ethics declarations

Conflict of interest

M. Ganesh Karthik declares that he has no conflict of interest. M. B. Mukesh Krishnan declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthik, M.G., Krishnan, M.B.M. Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-021-03082-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-021-03082-3

Keywords

Navigation