Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

IoT devices have become much popular in our daily lives, while attackers often invade network nodes to launch various attacks. In this work, we focus on the detection of insider attacks in IoT networks. Most existing algorithms calculate the reputation of all nodes based on the routing path. However...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & electrical engineering Jg. 77; S. 339 - 353
Hauptverfasser: Liu, Liang, Yang, Jingxiu, Meng, Weizhi
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Amsterdam Elsevier Ltd 01.07.2019
Elsevier BV
Schlagworte:
ISSN:0045-7906, 1879-0755
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:IoT devices have become much popular in our daily lives, while attackers often invade network nodes to launch various attacks. In this work, we focus on the detection of insider attacks in IoT networks. Most existing algorithms calculate the reputation of all nodes based on the routing path. However, they rely heavily on the assumption that different nodes in the same routing path have equal reputation, which may be not invalid in practice and cause inaccurate detection results. To solve this issue, we formulate it as a multivariate multiple linear regression problem and use the K-means classification algorithm to detect malicious nodes. Further, we optimize the routing path and design an enhanced detection scheme. Our results indicate that our proposed methods could achieve a detection accuracy rate of 90% or above in a common case, and the enhanced scheme could reach an even lower false detection rate, i.e., below 5%.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0045-7906
1879-0755
DOI:10.1016/j.compeleceng.2019.06.013