Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

IoT devices have become much popular in our daily lives, while attackers often invade network nodes to launch various attacks. In this work, we focus on the detection of insider attacks in IoT networks. Most existing algorithms calculate the reputation of all nodes based on the routing path. However...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Computers & electrical engineering Ročník 77; s. 339 - 353
Hlavní autoři: Liu, Liang, Yang, Jingxiu, Meng, Weizhi
Médium: Journal Article
Jazyk:angličtina
Vydáno: Amsterdam Elsevier Ltd 01.07.2019
Elsevier BV
Témata:
ISSN:0045-7906, 1879-0755
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:IoT devices have become much popular in our daily lives, while attackers often invade network nodes to launch various attacks. In this work, we focus on the detection of insider attacks in IoT networks. Most existing algorithms calculate the reputation of all nodes based on the routing path. However, they rely heavily on the assumption that different nodes in the same routing path have equal reputation, which may be not invalid in practice and cause inaccurate detection results. To solve this issue, we formulate it as a multivariate multiple linear regression problem and use the K-means classification algorithm to detect malicious nodes. Further, we optimize the routing path and design an enhanced detection scheme. Our results indicate that our proposed methods could achieve a detection accuracy rate of 90% or above in a common case, and the enhanced scheme could reach an even lower false detection rate, i.e., below 5%.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0045-7906
1879-0755
DOI:10.1016/j.compeleceng.2019.06.013