Abstract
Over the past few years, Internet of Things security has attracted the attention of many researchers due to its challenging and constrained nature. Particularly in the development of Network Intrusion Detection Systems which act as first line of defence for the networks. Due to the lack of reliable Internet of Things based datasets, intrusion detection approaches are suffering from uniform and accurate performance advancements. Existing benchmark datasets like KDD99, NSL-KDD cup 99 are obsolete and unfit for the evaluation of Network Intrusion Detection Systems developed for RPL based 6LoWPAN networks. To address this issue, the RPL-NIDDS17 dataset has recently been generated. This dataset consists seven types of modern routing attack patterns along with normal traffic patterns. In the proposed dataset we consider twenty two attributes that comprise of flow, basic, time type of features and two additional labelling attributes. In this study, we have shown the effectiveness of RPL-NIDDS17 by statistically analysing the probability distribution of features, correlation between features. Complexity analysis of the developed dataset is done by evaluating five machine learning techniques on the dataset. Evaluation results are shown in terms of two prominent metrics accuracy and false alarm rate, and compared with the results of KDD99, UNSW-NB15, WSN-DS datasets. The experimental results are presented to show the suitability of our proposed RPL-NIDDS17 dataset for the evaluation of Network Intrusion Detection Systems in Internet of Things.
Similar content being viewed by others
References
Turner, V., MacGillivray, C., & Gorman, P. (2017). Connecting the IoT: The road to success. https://www.idc.com/infographics/IoT. Accessed February 22, 2018
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3–9.
Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.
Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International conference on pervasive computing (ICPC), January 8, 2015 (pp. 1–6). IEEE.
Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 15(84), 25–37.
Sun, M., & Chen, T. (2010). Inventors; Inventec Corp, assignee. Network intrusion detection system. United States patent application US 12/411,916. September 30, 2010.
Wu, H., Schwab, S., & Peckham, R. L. (2008). Inventors; McAfee LLC, assignee. Signature based network intrusion detection system and method. United States patent US 7,424,744. September 9, 2008.
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1–2), 18–28.
Lippmann, R. P., Fried, D. J., Graf, I., Haines, J. W., Kendall, K. R., McClung, D., et al. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA information survivability conference and exposition, 2000. DISCEX’00. 2000 (Vol. 2, pp. 12–26). IEEE.
Moustafa, N., & Slay, J. (2016). The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective, 25(1–3), 18–31.
KDD99 Dataset. https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed February 22, 2017.
Stolfo, S. J., Fan, W., Lee, W., Prodromidis, A., & Chan, P. K. (2000) Cost-based modeling for fraud and intrusion detection: Results from the JAM project. In Proceedings of the DARPA information survivability conference and exposition, 2000. DISCEX’00. 2000 (Vol. 2, pp. 130-144). IEEE.
NSL-KDD cup 99. https://github.com/defcom17/NSL_KDD. Accessed February 22, 2018.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In IEEE symposium on computational intelligence for security and defense applications, CISDA 2009 (Cisda); 2009 (pp. 1–6).
UNSW-NB15 Dataset. https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/. Accessed February 22, 2018.
Almomani, I., Al-Kasasbeh, B., & Al-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, 2016.
Sharma, S., Mishra, R., & Singh, K. (2013). A review on wireless network security. In International conference on heterogeneous networking for quality, reliability, security and robustness, January 11, 2013 (pp. 668–681). Springer, Berlin.
Salman, T. Internet of things protocols and standards.
Winter, T. RPL: IPv6 routing protocol for low-power and lossy networks.
Aijaz, A., Su, H., & Aghvami, A. H. (2015). CORPL: A routing protocol for cognitive radio enabled AMI networks. IEEE Transactions on Smart Grid, 6(1), 477–85.
Shelby, Z., & Bormann, C. (2011). 6LoWPAN: The wireless embedded internet. Hoboken: Wiley.
Orebaugh, A., Ramirez, G., & Beale, J. (2006). Wireshark & Ethereal network protocol analyzer toolkit. Amsterdam: Elsevier.
Kreyszig, E. (2010). Advanced engineering mathematics. Hoboken: Wiley.
Justel, A., Peña, D., & Zamar, R. (1997). A multivariate Kolmogorov–Smirnov test of goodness of fit. Statistics & Probability Letters, 35(3), 251–9.
Mardia, K. V. (1970). Measures of multivariate skewness and kurtosis with applications. Biometrika, 57(3), 519–30.
Bland, J. M., & Altman, D. G. (1995). Calculating correlation coefficients with repeated observations: Part 2—correlation between subjects. BMJ, 310(6980), 633.
Karegowda, A. G., Manjunath, A. S., & Jayaram, M. A. (2010). Comparative study of attribute selection using gain ratio and correlation based feature selection. International Journal of Information Technology and Knowledge Management, 2(2), 271–7.
Panda, M., & Patra, M. R. (2007). Network intrusion detection using naive bayes. International Journal of Computer Science and Network Security, 7(12), 258–63.
Bouzida, Y., & Cuppens, F. (2006). Neural networks vs. decision trees for intrusion detection. In IEEE/IST workshop on monitoring, attack detection and mitigation (MonAM), September 2006 (Vol. 28, p. 29).
Mukkamala, S., Sung, A. H., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 28(2), 167–82.
Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Unsupervised clustering approach for network anomaly detection. In International conference on networked digital technologies, April 24, 2012 (pp. 135–145). Springer, Berlin.
DARPA’98 and DARPA’99 datasets (1999). https://www.ll.mit.edu/ideval/docs/index.html. Accessed February 22, 2018
IXIA PerfectStormOne Tool. (2014). http://www.ixiacom.com/products/perfectstorm. Accessed on Febrauary 22, 2018.
Tcpdump Tool. (2014). http://www.tcpdump.org/. Accessed on Febraury 22, 2018.
Argus Tool. (2014). http://qosient.com/argus/flowtools.html. Accessed on February 22, 2018.
Bro-IDS Tool. (2014). https://www.bro.org/. Accessed on February 22, 2018.
Xiangning, F., & Yulin, S. (2007). Improvement on LEACH protocol of wireless sensor network. In International conference on sensor technologies and applications, 2007. SensorComm October 14, 2007 (pp. 260–264). IEEE.
Ring, M., Wunderlich, S., Grüdl, D., Landes, D., & Hotho, A. (2017). Flow-based benchmark data sets for intrusion detection. In Proceedings of the 16th European conference on cyber warfare and security Jun 1, 2017 (pp. 361–369).
CIDDS-001 Dataset. (2017). https://www.hs-coburg.de/index.php?id=927. Accessed on February 22, 2018.
Claise, B. Cisco systems netflow services export version 9.
Verma, A., & Ranga, V. (2018). Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Computer Science, 31(125), 709–16.
NetSim Simulator and Emulator. http://www.tetcos.com/netsim-std.html. Accessed on February 22, 2018.
Palattella, M. R., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L. A., Boggia, G., et al. (2013). Standardized protocol stack for the internet of (important) things. IEEE Communications Surveys & Tutorials, 15(3), 1389–406.
Elmasri, R. (2008). Fundamentals of database systems. Bengaluru: Pearson Education India.
Velleman, P. F., & Wilkinson, L. (1993). Nominal, ordinal, interval, and ratio typologies are misleading. The American Statistician, 47(1), 65–72.
Shyu, M. L., Sarinnapakorn, K., Kuruppu-Appuhamilage, I., Chen, S. C., Chang, L., & Goldring, T. (2005). Handling nominal features in anomaly intrusion detection problems. In 15th international workshop on research issues in data engineering: Stream data mining and applications, 2005. RIDE-SDMA 2005. April 3, 2005 (pp. 55–62). IEEE.
Salem, M., & Buehler, U. (2012). Mining techniques in network security to enhance intrusion detection systems. arXiv preprint arXiv:1212.2414. December 11, 2012.
Cherkassky, V., & Mulier, F. M. (2007). Learning from data: concepts, theory, and methods. Hoboken: Wiley.
Appavu, S., Rajaram, R., Nagammai, M., Priyanga, N., & Priyanka, S. (2011). Bayes theorem and information gain based feature selection for maximizing the performance of classifiers. In International conference on computer science and information technology, January 2, 2011 (pp. 501–511). Springer, Berlin.
Gauvain, J. L., & Lee, C. H. (1994). Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains. IEEE Transactions on Speech and Audio Processing, 2(2), 291–8.
Scholz, F. W. (1985). Maximum likelihood estimation. Encyclopedia of statistical sciences.
GNU PSPP Tool. https://www.gnu.org/software/pspp/. Accessed February 22, 2018.
MATLAB. https://www.mathworks.com/products/matlab.html. Accessed on February 22, 2018.
Weka Data Mining Software. https://www.cs.waikato.ac.nz/ml/weka/. Accessed February 22, 2018.
Garner, S. 0R. (1995). Weka: The waikato environment for knowledge analysis. In Proceedings of the New Zealand computer science research students conference, April 18, 1995 (pp. 57–64).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Verma, A., Ranga, V. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT. Wireless Pers Commun 108, 1571–1594 (2019). https://doi.org/10.1007/s11277-019-06485-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06485-w