Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks
Blekinge Institute of Technology, Sweden.
RISE Research Institutes of Sweden, Digital Systems, Data Science.
RISE Research Institutes of Sweden, Digital Systems, Data Science.ORCID iD: 0000-0003-4044-4207
RISE Research Institutes of Sweden, Digital Systems, Data Science. Uppsala University, Sweden.ORCID iD: 0000-0002-2586-8573
2021 (English)In: Commun. Comput. Info. Sci.: Communications in Computer and Information ScienceVolume 1557 CCIS, Pages 214 - 2282022 1st International Conference on Ubiquitous Security, UbiSec 2021 Guangzhou 28 December 2021 through 31 December 2021, Springer Science and Business Media Deutschland GmbH , 2021, p. 214-228Conference paper, Published paper (Refereed)
Abstract [en]

IoT mesh networks typically consist of resource-constrained devices that communicate wirelessly. Since such networks are exposed to numerous attacks, designing intrusion detection systems is an important task and has attracted a lot of attention from the research community. Most existing work, however, has only considered a few network topologies, often also assuming a fixed number of nodes. In this paper, we generate a new large attack dataset, using Multi-Trace, a tool that we recently devised to generate traces to train machine learning algorithms. We show that using more and more diverse training data, the resulting intrusion detection models generalize better compared to those trained with less and less diverse training data. They even generalize well for larger topologies with more IoT devices. We also show that when we train different machine learning methods on our dataset, the resulting intrusion detection systems achieve very high performance. © 2022, The Author(s),

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH , 2021. p. 214-228
Keywords [en]
6LoWPAN, Blackhole, Dataset, Deep learning, Internet of Things, Intrusion detection system, Machine learning, RPL, Computer crime, Intrusion detection, Large dataset, Learning algorithms, Mesh generation, MESH networking, Topology, Black holes, Intrusion Detection Systems, Intrusion-Detection, MeshNetworks, Resourceconstrained devices, Training data
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:ri:diva-58893DOI: 10.1007/978-981-19-0468-4_16Scopus ID: 2-s2.0-85126240261ISBN: 9789811904677 (print)OAI: oai:DiVA.org:ri-58893DiVA, id: diva2:1647308
Conference
28 December 2021 through 31 December 2021
Note

 Funding text 1: This work was supported by the ITEA 3 project STACK funded by the Swedish Innovation Agency VINNOVA.

Available from: 2022-03-25 Created: 2022-03-25 Last updated: 2024-07-28Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Finne, NiclasVoigt, Thiemo

Search in DiVA

By author/editor
Finne, NiclasVoigt, Thiemo
By organisation
Data Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 183 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf