DOI QR코드

DOI QR Code

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali (Department of Information Technology, Bhauddin Zakariya University) ;
  • Maruf, Pasha (Department of Information Technology, Bhauddin Zakariya University) ;
  • Rabbiah, Zaheer (Department of Physics, Bhauddin Zakariya University) ;
  • Faiz, Jillani (Department of Information Technology, Bhauddin Zakariya University) ;
  • Urooj, Pasha (Institue of Management Sciences, Bhauddin Zakariya University)
  • Received : 2022.12.05
  • Published : 2022.12.30

Abstract

Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Keywords

References

  1. Boujrad, M., et al. (2020). Performance Assessment of Open Source IDS for improving IoT Architecture Security implemented on WBANs. Proceedings of the 3rd International Conference on Networking, Information Systems & Security.
  2. Habibzadeh, H.; Nussbaum, B.H.; Anjomshoa, F.; Kantarci, B.; Soyata, T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019, 50, 101660.
  3. Gartner. Gartner's Top 10 Security Predictions 2016. Available online: https://gtnr.it/2vRorda (accessed on 1 February 2020).
  4. Geer, D. The Internet of Things: Top five threats to IoT devices.Available online: https://bit.ly/2UVixkF (accessed on 1 February 2020).
  5. Ande, R.; Adebisi, B.; Hammoudeh, M.; Saleem, J. Internet of Things: Evolution and technologies from a security perspective. Sustain. Cities Soc. 2019, 54, 101728, doi:10.1016/j.scs.2019.101728.
  6. Riahi, A.; Challal, Y.; Natalizio, E.; Chtourou, Z.; Bouabdallah, A. A Systemic Approach for IoT Security. In Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Cambridge, MA, USA, 20-23 May 2013
  7. Jesus Pacheco, S.H. IoT Security Framework for Smart Cyber Infrastructures. In Proceedings of the IEEE International Workshops on Foundations and Applications of Self* Systems, Augsburg, Germany, 12-16 September 2016.
  8. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13-17 March 2017.
  9. Yao, X.; Han, X.; Du, X.; Zhou, X. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications. IEEE Sens. 2013, 13, 3693-3701. https://doi.org/10.1109/JSEN.2013.2266116
  10. Sundararajan, T. and A. J. J. o. C. S. Shanmugam (2010). "A novel intrusion detection system for wireless body area network in health care monitoring." 6(11): 1355.
  11. Al-Utaibi, K. A., et al. (2018). "Intrusion detection taxonomy and data preprocessing mechanisms." 34(3): 1369-1383. https://doi.org/10.3233/JIFS-169432
  12. Alhomoud, Adeeb & Munir, Rashid & Pagna Diss, Jules & Awan, Irfan & Al-Dhelaan, Abdullah. (2011). Performance Evaluation Study of Intrusion Detection Systems.Procedia CS. 5. December 2011, DOI: 173-180. 10.1016/j.procs.2011.07.024.
  13. P. Mehra, "A brief study and comparison of snort and bro open source network intrusion detection systems," International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 6, August 2012, ISSN : 2278 - 1021
  14. Sforzin, Alessandro & Gomez Marmol, Felix & Conti, Mauro & Bohli, Jens-Matthias. (2016). RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT. 440-448. July 2016, DOI: 10.1109/UICATC-ScalComCBDCom-IoP-SmartWorld.2016.0080.
  15. Sheikh, N. U., et al. (2018). "A Lightweight SignatureBased IDS for IoT Environment."
  16. Nam, K. and K. Kim (2018). A study on sdn security enhancement using open source ids/ips suricata. 2018 International Conference on Information and Communication Technology Convergence (ICTC), IEEE.
  17. Bouziani, O., et al. (2019). A Comparative study of Open Source IDSs according to their Ability to Detect Attacks. Proceedings of the 2nd International Conference on Networking, Information Systems & Security.
  18. Haddad Pajouh, H.; Javidan, R.; Khayami, R.; Ali, D.; Choo, K. A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 2016, 7, 314-323. https://doi.org/10.1109/TETC.2016.2633228
  19. Chordia, A.S.; Gupta, S. An Effective Model for Anomaly IDS to Improve the Efficiency. In Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India, 8-10 October 2015.
  20. Wang, K.; Du, M.; Yang, D.; Zhu, C.; Sun, Y. Optimal Active Detection in Machine-to-Machine Mobile Networks: A Repeated Game Approach. In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4-8 September 2016.
  21. Salman Niksefat a, Parisa Kaghazgaran b,*, Babak Sadeghiyan a Privacy issues in intrusion detection systems: A taxonomy, survey and future directions. APA Research Center, Amirkabir University of Technology, Tehran, Iran b Texas A & M University, TX, USA.
  22. Francois Trousset, Pascal Poncelet, Florent Masseglia, SAX: a privacy preserving general purpose method applied to detection of intrusions, in: First International Workshop on Privacy and Anonymity for Very Large Databases, ACM, 2009, pp. 17-24.
  23. (Accessed 5.7.2019), Yara documentation. URL: https://yara.= readthedocs.io/en/v3.5.0/index.html.
  24. Kozlov, D., et al. (2012). Security and privacy threats in IoT architectures. BODYNETS.
  25. D L. Filipe, F. Fdez-Riverola, N. Costa, A. Pereira, Wireless body area networks for healthcare applications: protocol stack review, Int. J. Distributed Sens. Netw. 11 (10) (2015).
  26. L. Filipe, F. Fdez-Riverola, N. Costa, A. Pereira, Wireless body area networks for healthcare applications: protocol stack review, Int. J. Distributed Sens. Netw. 11 (10) (2015).
  27. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Comput. Network. 38 (4) (2002) 393e422.
  28. T. Penzel, B. Kemp, G. Klosch, A. Schlogl, J. Hasan, A. Varri, I. Korhonen, Acquisition of biomedical signals databases, IEEE Eng. Med. Biol. Mag. 20 (3) (2001) 25e32.
  29. Kshetri, N. J. T. p. (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy." 41(10): 1027-1038.
  30. Banerjee, M., et al. (2018). "A blockchain future for internet of things security: a position paper." 4(3): 149-160. https://doi.org/10.1016/j.dcan.2017.10.006
  31. Restuccia, F., et al. (2018). "Securing the internet of things in the age of machine learning and software-defined networking." 5(6): 4829-4842. https://doi.org/10.1109/JIOT.2018.2846040
  32. Sharmeen, S., et al. (2018). "Malware threats and detection for industrial mobile-IoT networks." 6: 15941-15957.
  33. Xiao, L., et al. (2018). "Secure mobile crowdsensing based on deep learning." 15(10): 1-11. https://doi.org/10.1109/cc.2018.8485464
  34. Khan, M. A. and K. J. F. G. C. S. Salah (2018). "IoT security: Review, blockchain solutions, and open challenges." 82: 395-411. https://doi.org/10.1016/j.future.2017.11.022
  35. Reyna, A., et al. (2018). "On blockchain and its integration with IoT. Challenges and opportunities." 88: 173-190.
  36. Alfonso Panarello Id and Nachiket Tapas. 2018. Blockchain and IoT Integration : A Systematic Survey.
  37. Kumar, N. M. and P. K. J. P. C. S. Mallick (2018). "Blockchain technology for security issues and challenges in IoT." 132: 1815-1823.
  38. Kouicem, D. E., et al. (2018). "Internet of things security: A top-down survey." 141: 199-221.
  39. Xiaoyang Zhu and Youakim Badr. 2018. Identity management systems for the Internet of Things: A survey towards blockchain solutions. Sensors (Basel, Switzerland) 18, 12 (2018), 1-18 https://doi.org/10.3390/s18010001
  40. Chaabouni, N., et al. (2019). "Network intrusion detection for IoT security based on learning techniques." 21(3): 2671-2701. https://doi.org/10.1109/COMST.2019.2896380
  41. Hassija, V., et al. (2019). "A survey on IoT security: application areas, security threats, and solution architectures." 7: 82721-82743. https://doi.org/10.1109/access.2019.2924045
  42. da Costa, K. A., et al. (2019). "Internet of Things: A survey on machine learning-based intrusion detection approaches." 151: 147-157. https://doi.org/10.1016/j.comnet.2019.01.023
  43. Lin, Y., et al. (2015). "Performance evaluation of remote display access for mobile cloud computing." 72: 17-25. https://doi.org/10.1016/j.comcom.2015.05.006
  44. Ali, M. S., et al. (2018). "Applications of blockchains in the Internet of Things: A comprehensive survey." 21(2): 1676-1717.
  45. Kumar, S. A., et al. (2016). Security in internet of things: Challenges, solutions and future directions. 2016 49th Hawaii International Conference on System Sciences (HICSS), IEEE.
  46. Razouk, W., et al. (2017). A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. Proceedings of the 1st International Conference on Internet of Things and Machine Learning.
  47. Kraijak, S. and P. Tuwanut (2015). A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends. 2015 IEEE 16th International Conference on Communication Technology (ICCT), IEEE.
  48. Turkanovic, M., et al. (2014). "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion." 20: 96-112.
  49. Cardenas-Haro, J. A. and M. Dawson Jr (2019). Detecting and Preventing File Alterations in the Cloud Using a Distributed Collaborative Approach. 16th International Conference on Information Technology-New Generations (ITNG 2019), Springer.
  50. Zhao, K. and L. Ge (2013). A survey on the internet of things security. 2013 Ninth international conference on computational intelligence and security, IEEE.
  51. Bouloukakis, G., et al. (2019). "Automated synthesis of mediators for middleware-layer protocol interoperability in the IoT." 101: 1271-1294. https://doi.org/10.1016/j.future.2019.05.064
  52. Kraijak, S. and P. Tuwanut (2015). A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends. 2015 IEEE 16th International Conference on Communication Technology (ICCT), IEEE.