Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
Subject Areas : SpecialMohammad Mahdi Abdian 1 , majid ghayori 2 , Seyed Ahmad Eftekhari 3
1 - Master's Degree In Secure Computing, Computer Department, Imam Hossein University
2 - Assistant Professor, Computer Department, Imam Hossein University
3 - Bachelor Degree In Software Engineering, Islamic Azad University, Central Tehran Branch, Tehran, Iran
Keywords: Intrusion Detection, Blockchain, Internet Of Things, Machine Learning, Intrusion Detection Based On Machine Learning.,
Abstract :
Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs.
[1] S. Smys, A. Basar, and H. Wang, "Hybrid intrusion detection system for internet of Things (IoT) ", Journal of ISMAC, vol. 2, no. 04, pp. 190-199, 2020.
[2] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, "Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation", Springer International Conference on Advanced Information Networking and Application, AINA: Advanced Information Networking and Applications, Vol. 926, pp. 458-469, 2019.
[3] O. Alkadi, N. Moustafa, B. Turnbull, and K. R. Choo, "Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks", IEEE Internet of Things Journal, pp. 1-12, 2020.
[4] G. D. Putra, V. Dedeoglu, S. S. Kanhere, and R. Jurdak, "Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT," 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 256-257, 2020.
[5] W. Meng, E. W. Tischhauser, Q. Wang, Y. Wang, and J. Han, "When Intrusion Detection Meets Blockchain Technology: A Review," IEEE Access, vol. 6, pp. 10179-10188, 2018.
[6] S. Yakut, Ö. Şeker, E. Batur, and G. Dalkılıç, "Blockchain Platform for Internet of Things," 2019 Innovations in Intelligent Systems and Applications Conference (ASYU), Izmir, Turkey, pp. 1-6, 2019.
[7] H. T. T. Truong, M. Almeida, G. Karame, and C. Soriente, "Towards Secure and Decentralized Sharing of IoT Data", 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 176-183, 2019.
[8] A. Sforzin, F. G. Mármol, M. Conti, and J. -M. Bohli (2016), "RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT," 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), pp. 2016, 2016.
[9] A. M. Chandrasekhar, and K. Raghuveer, "Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers", 2013 International Conference on Computer Communication and Informatics IEEE, pp. 1-7, 2013.
[10] S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain, S. Khan, M. K. Khan, and K. K. R. Choo, "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.," Journal of Network and Computer Applications, pp. 98-120, 2016.
[11] P. Mehetrey, B. Shahriari, and M. Moh, "Collaborative ensemble-learning based intrusion detection systems for clouds.," 2016 International Conference on Collaboration Technologies and Systems (CTS), pp. 404-411, 2016.
[12] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," IEEE Symposium on Computers and Communication (ISCC), Larnaca, pp. 180-187, 2015.
[13] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of things (IoT) security: Current status, challenges and prospective measures," 10th International Conference for Internet Technology and Secured Transactions (ICITST) IEEE, London, pp. 336-341, 2015.
[14] S. Vashi, J. Ram, J. Modi, S. Verma, and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, pp. 492-496, 2017.
[15] S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system,"2009. http://bitcoin.org/bitcoin.pdf. [16] M., Crosby, N. P. Pattanayak, S. Verma, and V. Kalyanaraman, "BlockChain Technology: Beyond Bitcoin,," Applied Innovation Review, 2016.
[17] S. Zamani, Z. Moezkarimi, and Z. Golmirzaei (2019), "Classifying, Comparing, and Analyzing Blockchain Platforms," International Conference on Web Research, Tehran, Iran.
[18] T. W. Shinder, "The Best Damn Firewall Book Period," Elsevier, 2011.
[19] "research.unsw.edu.au," [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset.
[20] K. Yogesh, M. Karthik, T. Naveen, and S. Saravanan, "Design and Evaluation of Scalable Intrusion Detection System Using Machine Learning and Apache Spark," 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), pp. 1-7, 2019.
[21] "https://hyperledger-fabric.readthedocs.io/en/release-2.2/peers/peers.html," 2020. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-2.2/peers/peers.html
[22] "hyperledger-fabric," 2020. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-2.2/membership/membership.html.
[23] "hyperledger-fabric," hyperledger-fabric, 2018. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-1.3/ledger/ledger.html.
[24] "pycryptodome," [Online]. Available: https://pycryptodome.readthedocs.io/en/latest/src/hash/sha3_256.html.
[25] "https://hyperledger-fabric.readthedocs.io," 2020. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-2.2/deployment_guide_overview.html.
[26] C. A. Ronao, and S. B. Cho, “Mining SQL queries to detect anomalous database access using random forest and PCA”, In International conference on industrial, engineering and other applications of applied intelligent systems (pp. 151-160). Springer, Cham., 2015.
[27] "https://hyperledger-fabric.readthedocs.io/en/release-2.2," 2020. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-2.2/create_channel/create_channel_config.html?highlight=batchtimeout#orderer.