Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)
Full Length Article

Journal of Intelligent Systems and Internet of Things

Volume 12 , Issue 2 , PP: 195-207, 2024 | Cite this article as | XML | Html | PDF

Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis

Deepak Dasaratha Rao 1 , Akhilesh A. Waoo 2 , Murlidhar Prasad Singh 3 , Piyush Kumar Pareek 4 * , Shoaib Kamal 5 , Shraddha V. Pandit 6

  • 1 Indian Institute of Technology, Patna, India - (deepakrao@ieee.org)
  • 2 Associate Dean and Head, CS/IT, AKS University, SATNA, MP, India - (akhileshwaoo@gmail.com)
  • 3 Department of, C.S.& E., B. P. Mandal College of Engineering, Madhepura, Bihar, India - (singhmurlidhar@gmail.com)
  • 4 Department of AIML and IPR Cell Nitte Meenakshi Institute of Technology Bengaluru, Karnataka, India – 560064, India - (piyush.kumar@nmit.ac.in)
  • 5 Department of ECE, Dr. B. R. Ambedkar Institute of Technology, Port Blair, Andaman & Nicobar Islands, India-744103, India - (shoaibkamal87@gmail.com)
  • 6 Department of Artificial Intelligence and Data Science, PES Modern College of Engineering, Shivajinagar, Pune-411005, India - (shraddha.pandit@moderncoe.edu.in)
  • Doi: https://doi.org/10.54216/JISIoT.120215

    Received: August 12, 2023 Revised: November 15, 2023 Accepted: April: 28, 2024
    Abstract

    This research introduces an algorithmic framework for enhancing the security of Internet of Things (IoT) networks. The Enhanced Anomaly Detection (EAD) algorithm initiates the process by detecting anomalies in real-time IoT data, serving as the foundational layer. The Behavior Analysis for Profiling (BAP) algorithm builds upon EAD, adding behavior analysis for profiling and adaptive identification of abnormal behavior. Signature-Based Detection (SBD) involves pre-identified attack signatures, which supports detection of known attacks and provides proactive defense measures against documented threats. The MLID, or the Machine Learning-Based Intrusion Detection, algorithm uses trained machine learning models in order to detect anomalies and the adaptability to changing security risks. The Real-Time Threat Intelligence Integration (RTI) algorithm integrates updated threat intelligence feeds, which improves the framework's responsiveness to emerging threats. The visual representations illustrate once again the idea of the new framework being very accurate at intergration, applicability, and overal security effectiveness. The research makes a standard solution which proves to be a smart and responsive way guarding the IoT networks reducing and even fighting known and potential threats in a real-time mode.

    Keywords :

    Anomaly Detection , Behavior Analysis , Dynamic Threshold Adjustment , IoT Security , Machine Learning-Based Intrusion Detection , Real-Time Threat Intelligence Integration , Robust Detection , Signature-Based Detection , Training Data.

    References

    [1]     J. Li, Z. Zhao, R. Li, and H. Zhang, "AI-Based two-stage intrusion detection for software defined IoT networks," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2093–2102, 2019.

    [2]     G. Hatzivasilis, S. Othonas, I. Sotiris, and V. ChristosD. Giorgos and T. Christos, "Review of security and privacy for the internet of medical things (IoMT)," in Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE, Santorini, Greece, August 2019.

    [3]     D. Pathak and R. Kashyap, "Neural correlate-based E-learning validation and classification using convolutional and Long Short-Term Memory networks," Traitement du Signal, vol. 40, no. 4, pp. 1457-1467, 2023. [Online]. Available: https://doi.org/10.18280/ts.400414

    [4]     R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [5]     D. Bavkar, R. Kashyap, and V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [6]     M. Moradi, M. Moradkhani, and M. B. Tavakoli, "Security-level improvement of IoT-based systems using biometric features," Wireless Communications and Mobile Computing, vol. 2022, Article ID 8051905, pp. 1–15, 2022.

    [7]     I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, "Anatomy of threats to the internet of things," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1636–1675, 2019.

    [8]     D. Javeed, T. Gao, M. T. Khan, and I. Ahmad, "A hybrid deep learning-driven SDN enabled mechanism for secure communication in the internet of things (IoT)," Sensors, vol. 21, no. 14, p. 4884, 2021.

    [9]     N. Ben-Asher and C. Gonzalez, "Effects of cyber security knowledge on attack detection," Computers in Human Behavior, vol. 48, pp. 51–61, 2015.

    [10]   J. G. Kotwal, R. Kashyap, and P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [11]   V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [12]   R. Kashyap, "Machine Learning, Data Mining for IoT-Based Systems," in Research Anthology on Machine Learning Techniques, Methods, and Applications, Information Resources Management Association, Ed. IGI Global, 2022, pp. 447-471. [Online]. Available: https://doi.org/10.4018/978-1-6684-6291-1.ch025

    [13]   D. Putra and A. Wibowo, "Sentiment Analysis for Board Game Review using Deep Learning and Sentiment Lexicon," Int. J. Emerg. Technol. Adv. Eng., vol. 12, no. 6, pp. 56–62, 2022.

    [14]   M. Z. Infusi, G. P. Kusuma, and D. A. Arham, "Prediction of Local Government Revenue using Data Mining Method," Int. J. Emerg. Technol. Adv. Eng., vol. 12, no. 1, pp. 63–74, 2022.

    [15]   M. Bathre and A. Sahelay, "Energy efficient route discovery algorithm for MANET," Int. J. Eng. Res. Technol. (IJERT), vol. 2, no. 7, pp. 1291–1295, 2013.

    [16]   H. S. Alhares, Q. A. Ali, M. A. A. Shaban, M. J. M-Ridha, H. R. Bohan, et al., "Rice husk coated with copper oxide nanoparticles for 17α-ethinylestradiol removal from an aqueous solution: adsorption mechanisms and kinetics," Environ. Monit. Assess., vol. 195, no. 9, Art. no. 1078, 2023.

    [17]   G. M. Aziz, S. I. Hussein, M. J. M-Ridha, S. J. Mohammed, K. M. Abed, et al., "Activity of laccase enzyme extracted from Malva parviflora and its potential for degradation of reactive dyes in aqueous solution," Biocatal. Agric. Biotechnol., vol. 50, Art. no. 102671, 2023.

    [18]   Q. A. Ali, H. S. Alhares, H. H. Abd‐almohi, M. J. M‐Ridha, S. J. Mohammed, et al., "Enhancing Microbial Desalination Cell Performance for Water Desalination and Wastewater Treatment: Experimental Study and Modelling of Electrical Energy Production in Open and …," J. Chem. Technol. Biotechnol., 2024.

    [19]   I. V. Esin and K. V. Balakin, "Medical Diagnostic Decision Support Systems Based on Artificial Intelligence Algorithms," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 12, pp. 28–38, 2021.

    [20]   N. R. Adytia and G. P. Kusuma, "Indonesian license plate detection and identification using deep learning," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 7, pp. 1–7, 2021.

    [21]   M. S. Hamid, N. A. Manap, R. A. Hamzah, and A. F. Kadmin, "Stereo matching algorithm based on hybrid convolutional neural network and directional intensity difference," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 6, pp. 87–97, 2021.

    [22]   T. Mohapatra, S. S. Mishra, M. Bathre, and S. S. Sahoo, "Taguchi and ANN-based optimization method for predicting maximum performance and minimum emission of a VCR diesel engine powered by diesel, biodiesel, and producer gas," World J. Eng., vol. ahead-of-print, no. ahead-of-print, 2023.

    [23]   H. P. Sahu and R. Kashyap, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [24]   S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    Cite This Article As :
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit. "Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis." Full Length Article, Vol. 12, No. 2, 2024 ,PP. 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit. (2024). Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of , 12 ( 2 ), 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit. "Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis." Journal of , 12 no. 2 (2024): 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit. (2024). Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of , 12 ( 2 ), 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit. Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of , (2024); 12 ( 2 ): 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)
    Deepak Dasaratha Rao, Akhilesh A. Waoo, Murlidhar Prasad Singh, Piyush Kumar Pareek, Shoaib Kamal, Shraddha V. Pandit, Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis, Journal of , Vol. 12 , No. 2 , (2024) : 195-207 (Doi   :  https://doi.org/10.54216/JISIoT.120215)