Cargando…

A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT

At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding s...

Descripción completa

Detalles Bibliográficos
Autores principales: Morales-Molina, Carlos D., Hernandez-Suarez, Aldo, Sanchez-Perez, Gabriel, Toscano-Medina, Linda K., Perez-Meana, Hector, Olivares-Mercado, Jesus, Portillo-Portillo, Jose, Sanchez, Victor, Garcia-Villalba, Luis Javier
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8124991/
https://www.ncbi.nlm.nih.gov/pubmed/34063577
http://dx.doi.org/10.3390/s21093173
_version_ 1783693369741934592
author Morales-Molina, Carlos D.
Hernandez-Suarez, Aldo
Sanchez-Perez, Gabriel
Toscano-Medina, Linda K.
Perez-Meana, Hector
Olivares-Mercado, Jesus
Portillo-Portillo, Jose
Sanchez, Victor
Garcia-Villalba, Luis Javier
author_facet Morales-Molina, Carlos D.
Hernandez-Suarez, Aldo
Sanchez-Perez, Gabriel
Toscano-Medina, Linda K.
Perez-Meana, Hector
Olivares-Mercado, Jesus
Portillo-Portillo, Jose
Sanchez, Victor
Garcia-Villalba, Luis Javier
author_sort Morales-Molina, Carlos D.
collection PubMed
description At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.
format Online
Article
Text
id pubmed-8124991
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-81249912021-05-17 A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT Morales-Molina, Carlos D. Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda K. Perez-Meana, Hector Olivares-Mercado, Jesus Portillo-Portillo, Jose Sanchez, Victor Garcia-Villalba, Luis Javier Sensors (Basel) Article At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts. MDPI 2021-05-03 /pmc/articles/PMC8124991/ /pubmed/34063577 http://dx.doi.org/10.3390/s21093173 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Morales-Molina, Carlos D.
Hernandez-Suarez, Aldo
Sanchez-Perez, Gabriel
Toscano-Medina, Linda K.
Perez-Meana, Hector
Olivares-Mercado, Jesus
Portillo-Portillo, Jose
Sanchez, Victor
Garcia-Villalba, Luis Javier
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_full A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_fullStr A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_full_unstemmed A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_short A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
title_sort dense neural network approach for detecting clone id attacks on the rpl protocol of the iot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8124991/
https://www.ncbi.nlm.nih.gov/pubmed/34063577
http://dx.doi.org/10.3390/s21093173
work_keys_str_mv AT moralesmolinacarlosd adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT hernandezsuarezaldo adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT sanchezperezgabriel adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT toscanomedinalindak adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT perezmeanahector adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT olivaresmercadojesus adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT portilloportillojose adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT sanchezvictor adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT garciavillalbaluisjavier adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT moralesmolinacarlosd denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT hernandezsuarezaldo denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT sanchezperezgabriel denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT toscanomedinalindak denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT perezmeanahector denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT olivaresmercadojesus denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT portilloportillojose denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT sanchezvictor denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot
AT garciavillalbaluisjavier denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot