Cargando…
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding s...
Autores principales: | , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8124991/ https://www.ncbi.nlm.nih.gov/pubmed/34063577 http://dx.doi.org/10.3390/s21093173 |
_version_ | 1783693369741934592 |
---|---|
author | Morales-Molina, Carlos D. Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda K. Perez-Meana, Hector Olivares-Mercado, Jesus Portillo-Portillo, Jose Sanchez, Victor Garcia-Villalba, Luis Javier |
author_facet | Morales-Molina, Carlos D. Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda K. Perez-Meana, Hector Olivares-Mercado, Jesus Portillo-Portillo, Jose Sanchez, Victor Garcia-Villalba, Luis Javier |
author_sort | Morales-Molina, Carlos D. |
collection | PubMed |
description | At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts. |
format | Online Article Text |
id | pubmed-8124991 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-81249912021-05-17 A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT Morales-Molina, Carlos D. Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda K. Perez-Meana, Hector Olivares-Mercado, Jesus Portillo-Portillo, Jose Sanchez, Victor Garcia-Villalba, Luis Javier Sensors (Basel) Article At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack—the Clone ID attack—directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts. MDPI 2021-05-03 /pmc/articles/PMC8124991/ /pubmed/34063577 http://dx.doi.org/10.3390/s21093173 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Morales-Molina, Carlos D. Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda K. Perez-Meana, Hector Olivares-Mercado, Jesus Portillo-Portillo, Jose Sanchez, Victor Garcia-Villalba, Luis Javier A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title | A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_full | A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_fullStr | A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_full_unstemmed | A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_short | A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT |
title_sort | dense neural network approach for detecting clone id attacks on the rpl protocol of the iot |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8124991/ https://www.ncbi.nlm.nih.gov/pubmed/34063577 http://dx.doi.org/10.3390/s21093173 |
work_keys_str_mv | AT moralesmolinacarlosd adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT hernandezsuarezaldo adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT sanchezperezgabriel adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT toscanomedinalindak adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT perezmeanahector adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT olivaresmercadojesus adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT portilloportillojose adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT sanchezvictor adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT garciavillalbaluisjavier adenseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT moralesmolinacarlosd denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT hernandezsuarezaldo denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT sanchezperezgabriel denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT toscanomedinalindak denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT perezmeanahector denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT olivaresmercadojesus denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT portilloportillojose denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT sanchezvictor denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot AT garciavillalbaluisjavier denseneuralnetworkapproachfordetectingcloneidattacksontherplprotocoloftheiot |