A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

Another paper of ours in IoT networks incident detection:

With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure. In this paper, we present a novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks. The proposed model is using component analysis and linear discriminate analysis of dimension reduction module to spate the high dimensional dataset to a lower one with lesser features. We then apply a two-tier classification module utilizing Naïve Bayes and Certainty Factor version of K-Nearest Neighbor to identify suspicious behaviors. The experiment results using NSL-KDD dataset shows that our model outperforms previous models designed to detect U2R and R2L attacks.

Here is the link to the published article: http://ieeexplore.ieee.org/document/7762123/

Ali Dehghantanha

Dr. AliDehghantanha (www.alid.info) has served for more than a decade in a variety of industrial and academic positions with leading players in Cyber-Security and E-Commerce. He has long history of working in different areas of computer security as security researcher, malware analyzer, penetration tester, security consultant, professional trainer, and university lecturer. Ali is imminently qualified in the field of cyber security; he has an EU Marie Curie post-doctoral fellowship in cyber forensics (the Marie Curie Fellowships are Europe’s most competitive and prestigious award), Ph.D in Security in Computing and a number of professional qualifications namely SANS-GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), SANS-GIAC Reverse Engineering Malware (GREM), SANS-GIAC Certified Forensics Analyst (GCFA), CCFP (Certified Cyber Forensic Professional), CISSP (Certified Information Systems Security Professional), and CEH (Certified Ethical Hacker). Ali is a fellow of the UK Higher Education Academy (HEA) and served as a keynote speaker for a number of security conferences namely the International Conference on Information Security and Cyber Forensics (InfoSec2015) speaking about “Detection and analysis IoT Malwares" at Cape-Town, South Africa, keynote speaker at the International Conference on Information Security and Digital Forensics (ISDF2015) speaking on "Efficient Analysis of Malware Campaigns" at Kuala Lumpor, Malaysia and invited speaker for ISACA EuroCACS/ISRM 2015 speaking about "Finding the Needle in Internet of Everything Haystack" at Copenhagen, Denmark. In 2015, he was an invited speaker for ISACA North-West UK meeting and talked about "Strategic Cyber Threat Intelligence".  He was one of the lead editors for Elsevier book titled “Contemporary digital forensic investigations of cloud and mobile applications” and a guest editor for a special issue on “Internet of Things: Security and Forensics Trends and Challenges” in the Elsevier Future Generation Computer Systems journal, guest editor for a special issue on "Big Data Applications in Cyber Security and Threat Intelligence" in IEEE Transactions on Big Data.  Ali is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)” and served as editor in chief for the International Journal of Cyber Security and Digital Forensics (IJCSDF) between Jan 2012 to Jan 2015!