Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack but fails when the attacks are combined. In this paper, we propose an IDS known as compression header analyzer intrusion detection s...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
Institute of Electrical and Electronics Engineers
2018
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/21169/ https://doi.org/10.1109/ACCESS.2018.2798626 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.21169 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.211692019-05-08T06:52:46Z http://eprints.um.edu.my/21169/ Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol Napiah, Mohamad Nazrin Idris, Mohd Yamani Idna Ramli, Roziana Ahmedy, Ismail QA75 Electronic computers. Computer science Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack but fails when the attacks are combined. In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. CHA-IDS is a multi-agent system framework that capture and manage raw data for data collection, analysis, and system actions. The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. To ensure the reliability of our proposed method, we evaluate the CHA-IDS with three types of combination attacks known as hello flood, sinkhole, and wormhole. We also compare our results in term of accuracy of detection, energy overhead, and memory consumption with the prior 6LoWPAN-IDS implementation such as SVELTE and Pongle's IDS. The results show that CHA-IDS performs better than the aforementioned methods with 99% true positive rate and consumed low energy overhead and memory that fit in constrained device such Tmote Sky. Institute of Electrical and Electronics Engineers 2018 Article PeerReviewed Napiah, Mohamad Nazrin and Idris, Mohd Yamani Idna and Ramli, Roziana and Ahmedy, Ismail (2018) Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol. IEEE Access, 6. pp. 16623-16638. ISSN 2169-3536 https://doi.org/10.1109/ACCESS.2018.2798626 doi:10.1109/ACCESS.2018.2798626 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Napiah, Mohamad Nazrin Idris, Mohd Yamani Idna Ramli, Roziana Ahmedy, Ismail Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
description |
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack but fails when the attacks are combined. In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. CHA-IDS is a multi-agent system framework that capture and manage raw data for data collection, analysis, and system actions. The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. To ensure the reliability of our proposed method, we evaluate the CHA-IDS with three types of combination attacks known as hello flood, sinkhole, and wormhole. We also compare our results in term of accuracy of detection, energy overhead, and memory consumption with the prior 6LoWPAN-IDS implementation such as SVELTE and Pongle's IDS. The results show that CHA-IDS performs better than the aforementioned methods with 99% true positive rate and consumed low energy overhead and memory that fit in constrained device such Tmote Sky. |
format |
Article |
author |
Napiah, Mohamad Nazrin Idris, Mohd Yamani Idna Ramli, Roziana Ahmedy, Ismail |
author_facet |
Napiah, Mohamad Nazrin Idris, Mohd Yamani Idna Ramli, Roziana Ahmedy, Ismail |
author_sort |
Napiah, Mohamad Nazrin |
title |
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
title_short |
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
title_full |
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
title_fullStr |
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
title_full_unstemmed |
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol |
title_sort |
compression header analyzer intrusion detection system (cha - ids) for 6lowpan communication protocol |
publisher |
Institute of Electrical and Electronics Engineers |
publishDate |
2018 |
url |
http://eprints.um.edu.my/21169/ https://doi.org/10.1109/ACCESS.2018.2798626 |
_version_ |
1643691485965582336 |
score |
13.211869 |