Configuring and Implementing IPS Solutions for IoT Devices using NST

Main Article Content

V. Maruthi Prasad
B. Bharathi

Abstract

The necessity to ensure that Internet of Things (IoT) networks are secure is one of the biggest issues that has arisen as a result of the growing demand for technology that uses the IoT. Considering how many gadgets are linked to the internet, safeguarding their networks is a growing worry. Due to the IoT's network's complexity and resource constraints, traditional intrusion detection systems encounter a number of problems. The main objectives of this project are to design, develop, and evaluate a hybrid level placement method for an IDS based on multi- agent systems, BC technology (Block-Chain), and DL algorithms (Deep Learning). The breakdown of data administration, data collection, analysis, and reaction into its component parts reveals the overall system design. The National Security Laboratory's knowledge discovery and data mining dataset is used to test the system as part of the validation procedure. These results demonstrate how deep learning algorithms are effective at identifying risks at the network and transport levels. The experiment shows that deep learning techniques function well when used to find intrusions in a network environment for the Internet of Things.

Article Details

How to Cite
Prasad, V. M. ., & Bharathi, B. . (2023). Configuring and Implementing IPS Solutions for IoT Devices using NST. International Journal on Recent and Innovation Trends in Computing and Communication, 11(11s), 349–358. https://doi.org/10.17762/ijritcc.v11i11s.8162
Section
Articles

References

Balamurugan, S., Ayyasamy, A., Suresh Joseph, K., (2020), Improvement of C5.0 algorithm using internet of things with Bayesian principles for food traceability systems, Modern Supply Chain Research and Applications. .

Balamurugan, S., Ayyasamy, A., Suresh Joseph, K., (2020), Enhanced Petri Nets for Traceability of Food Management using Internet of Things, Peer-to-Peer Networking and Applications.

"Security in Internet of Things: Issues, challenges, taxonomy, and architecture" by Adat, V. Gupta, B. Model. Anal. Des. Manag. 2018, 67, 423–441.

"Security Attacks at MAC and Network Layer in Wireless Sensor Networks" by J. Adv. Res. Dyn. Control Syst. 2019, 11, 82–89.

https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

"Routing Attacks and Countermeasures in the RPL-Based Internet of Things" by Wallgren, L.; Raza, S.; Voigt, T. Int. J. Distrib. Sens. Netw. 2013, 9, 794326.

" Research on immunity-based intrusion detection technology for the Internet of Things. In Proceedings of the 2011" by Liu, C.; Yang, J.; Chen, R.; Zhang, Y.; Zeng, J. Seventh International Conference on Natural, Shanghai, China, 26–28 July 2011.

" Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach " by Bostani, H.; Sheikhan, M. Comput. Commun. 2017, 98, 52–71.

K. Dass , A. ., & Lokhande , S. D. . (2023). Machine Learning Based Prediction of Obsolescence Risk . International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 293–301. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2667.

A Multi-tier Reinforcement Learning Model for a Cooperative Multi-agent System" by Shi, H.; Zhai, L.; Wu, H.; Hwang, M.; Hwang, K.; Hsu, H. . IEEE Trans. Cogn. Dev. Syst. 2020.

Calvaresi, D.; Dubovitskaya, A.; Calbimonte, J.P.; Taveter, K.; Schumacher, M. Multi- Agent Systems and Blockchain: Results from a Systematic Literature Review. In Proceedings of the International Conference on Practical Applications of Agents and Multi- Agent Systems, Toledo, Spain, 20–22 June 2018.

Shi, H.; Zhai, L.; Wu, H.; Hwang, M.; Hwang, K.; Hsu, H. A Multi-tier Reinforcement Learning Model for a Cooperative Multi-agent System. IEEE Trans. Cogn. Dev. Syst. 2020. [CrossRef]

Dr. Govind Shah. (2017). An Efficient Traffic Control System and License Plate Detection Using Image Processing. International Journal of New Practices in Management and Engineering, 6(01), 20 - 25. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/52.

Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [CrossRef]

Duong, T.; Todi, K.K.; Chaudhary, U.; Truong, H. Decentralizing Air Trac Flow Management with Blockchain-based Reinforcement Learning. In Proceedings of the IEEE 17th International Conference on Industrial Informatics (INDIN), Helsinki, Finland, 23– 25 July 2019; pp. 1795–1800. [CrossRef]

Casado-Vara, R.; Prieta, F.D.L.; Prieto, J.; Corchado, J.M. Blockchain framework for IoT data quality via edge computing. In Proceedings of the BlockSys’18: 1st Workshop on Blockchain-enabled Networked Sensor System 2018, Shenzhen, China, 4 November 2018. [CrossRef]

Li, D.; Deng, L.; Lee, M.; Wang, H. IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 2019, 49, 533–545. [CrossRef] Electronics 2020, 9, 1120 26 of 27

Kanna, D. ., & Muda, I. . (2021). Hybrid Stacked LSTM Based Classification in Prediction of Weather Forecasting Using Deep Learning. Research Journal of Computer Systems and Engineering, 2(1), 46:51. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/22

Le, T.-T.-H.; Kim, Y.; Kim, H. Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks. Appl. Sci. 2019, 9, 1392. [CrossRef]

Arshad, J.; Azad, M.A.; Abdeltaif, M.M.; Salah, K. An intrusion detection framework for energy constrained IoT devices. Mech. Syst. Signal Process. 2020, 136, 106436. [CrossRef]

Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 2019, 6, 9042–9053. [CrossRef]

Thomas Wilson, Andrew Evans, Alejandro Perez, Luis Pérez, Juan Martinez. Integrating Machine Learning and Decision Science for Effective Risk Management. Kuwait Journal of Machine Learning, 2(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/208.

V. Maruthi Prasad, B. Bharathi, "A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm", International Journal of Computer Networks and Applications (IJCNA), 9(6), PP: 712-723, 2022, DOI: 10.22247/ijcna/2022/217704.

Prasad, V. M. ., & Bharathi, B. (2023). Security in 5G Networks: A Systematic Analysis of High-Speed Data Connections. International Journal on Recent and Innovation Trends in Computing and Communication,11(5),216–222. https://doi.org/10.17762/ijritcc.v11i5.6608.