IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v12y2020i3p44-d327127.html
   My bibliography  Save this article

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks

Author

Listed:
  • Mohamed Amine Ferrag

    (Department of Computer Science, Guelma University, Guelma 24000, Algeria)

  • Leandros Maglaras

    (School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK)

  • Ahmed Ahmim

    (Departement of Mathematics and Computer Science, Mohamed-Cherif Messaadia University, Souk Ahras 41000, Algeria)

  • Makhlouf Derdour

    (Departement of Mathematics and Computer Science, University of Larbi Tebessi, Tebessa 12002, Algeria)

  • Helge Janicke

    (Cyber Security Cooperative Research Centre, Edith Cowan University, Perth 6027, Australia)

Abstract

This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial data set in addition to the outputs of the first and the second classifier as inputs. The experimental results obtained by analyzing the proposed IDS using the CICIDS2017 dataset and BoT-IoT dataset, attest their superiority in terms of accuracy, detection rate, false alarm rate and time overhead as compared to state of the art existing schemes.

Suggested Citation

  • Mohamed Amine Ferrag & Leandros Maglaras & Ahmed Ahmim & Makhlouf Derdour & Helge Janicke, 2020. "RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks," Future Internet, MDPI, vol. 12(3), pages 1-14, March.
  • Handle: RePEc:gam:jftint:v:12:y:2020:i:3:p:44-:d:327127
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/12/3/44/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/12/3/44/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Yan Hu & An Yang & Hong Li & Yuyan Sun & Limin Sun, 2018. "A survey of intrusion detection on industrial control systems," International Journal of Distributed Sensor Networks, , vol. 14(8), pages 15501477187, August.
    2. Mohamed Amine Ferrag, 2017. "EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 66(4), pages 671-688, December.
    3. Alcaraz, Cristina & Zeadally, Sherali, 2015. "Critical infrastructure protection: Requirements and challenges for the 21st century," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 53-66.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sriranga Suprabhath Koduru & Venkata Siva Prasad Machina & Sreedhar Madichetty, 2023. "Cyber Attacks in Cyber-Physical Microgrid Systems: A Comprehensive Review," Energies, MDPI, vol. 16(12), pages 1-36, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tomáš Fröhlich & Zdeněk Hon & Martin Staněk & Jiří Slabý, 2023. "Method of Identification and Assessment of Security Needs of a Region against the Threat of a Large Power Outage," Energies, MDPI, vol. 16(11), pages 1-16, May.
    2. Farsi, Hamed & Fanian, Ali & Taghiyarrenani, Zahra, 2019. "A novel online state-based anomaly detection system for process control networks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
    3. Milan Stojkov & Nikola Dalčeković & Branko Markoski & Branko Milosavljević & Goran Sladić, 2021. "Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid," Energies, MDPI, vol. 14(21), pages 1-29, October.
    4. Hadi Alizadeh & Ayyoob Sharifi, 2020. "Assessing Resilience of Urban Critical Infrastructure Networks: A Case Study of Ahvaz, Iran," Sustainability, MDPI, vol. 12(9), pages 1-20, May.
    5. Katarzyna Rostek & Michał Wiśniewski & Witold Skomra, 2022. "Analysis and Evaluation of Business Continuity Measures Employed in Critical Infrastructure during the COVID-19 Pandemic," Sustainability, MDPI, vol. 14(22), pages 1-22, November.
    6. Bell, Alison J.C. & Rogers, M. Brooke & Pearce, Julia M., 2019. "The insider threat: Behavioral indicators and factors influencing likelihood of intervention," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 166-176.
    7. David Rehak & Michal Radimsky & Martin Hromada & Zdenek Dvorak, 2019. "Dynamic Impact Modeling as a Road Transport Crisis Management Support Tool," Administrative Sciences, MDPI, vol. 9(2), pages 1-16, March.
    8. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    9. Michal Wisniewski, 2021. "The Role of Integral Model of Critical Infrastructure Safety in Industry 4.0," European Research Studies Journal, European Research Studies Journal, vol. 0(3), pages 1153-1188.
    10. Mohamed Amine Ferrag & Leandros Maglaras & Abdelouahid Derhab & Helge Janicke, 2020. "Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 73(2), pages 317-348, February.
    11. Bhandari, Pratik & Creighton, Douglas & Gong, Jinzhe & Boyle, Carol & Law, Kris M.Y., 2023. "Evolution of cyber-physical-human water systems: Challenges and gaps," Technological Forecasting and Social Change, Elsevier, vol. 191(C).
    12. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    13. CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
    14. Wei, Sen & Li, Yanping & Yang, Hanqing & Xie, Minghui & Wang, Yuanqing, 2023. "A comprehensive operation and maintenance assessment for intelligent highways: A case study in Hong Kong-Zhuhai-Macao bridge," Transport Policy, Elsevier, vol. 142(C), pages 84-98.
    15. Giudicianni, Carlo & Herrera, Manuel & Di Nardo, Armando & Oliva, Gabriele & Scala, Antonio, 2021. "The faster the better: On the shortest paths role for near real-time decision making of water utilities," Reliability Engineering and System Safety, Elsevier, vol. 212(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:12:y:2020:i:3:p:44-:d:327127. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.