Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments

Vandana Choudhary,Sarvesh Tanwar
DOI: https://doi.org/10.1007/s11042-024-19066-2
IF: 2.577
2024-04-19
Multimedia Tools and Applications
Abstract:The Internet of Things (IoT) has garnered significant attention for its diverse applications, but the proliferation of devices introduces security threats. This paper addresses the need for comprehensive IoT-specific datasets to enhance research on intrusion detection systems (IDSs) and security mechanisms for IoT. Using the Cooja Simulator (Contiki-OS), we present a methodological approach for generating benign and malicious IoT-specific datasets, specifically leveraging a blackhole attack. We examine the impact of single and colluding blackhole attacks on the Routing Protocol for Low Power and Lossy Networks (RPL). Our results highlight a discernible decrease in packet delivery rate and a concurrent increase in average power consumption as malicious nodes escalate, underscoring the need to consider malicious scenarios in evaluating IoT network performance. The study provides crucial insights into compromised networks. Moreover, the generated datasets were employed for the training and assessment of various machine learning and deep learning models. Notably, the Decision Tree model outperformed other models, including Logistic Regression, Random Forest, Naïve Bayes, Support Vector Machine (SVM), Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and CNN-LSTM. The Decision Tree consistently demonstrated exceptional performance, attaining a perfect score of 100% across all scenarios, setting it apart from the other models. The diverse performance exhibited by these models across different malicious scenarios emphasizes the importance of selecting appropriate models for effective intrusion detection in IoT networks. In conclusion, our study represents a valuable resource for the IoT research community, providing authentic datasets, insights into network compromise effects, and model performance evaluation. These findings not only emphasize the immediate need for robust security measures in IoT environments but also pave the way for future investigations into novel attacks and innovative mitigation strategies.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?