Smart City Gnosys

Smart city article details

Title On The Impact Of Blackhole-Attack Variations On Ml-Based Intrusion Detection Systems In Iot
ID_Doc 39857
Authors Kaveh A.; Pettersson A.; Rohner C.; Johnsson A.
Year 2023
Published Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023
DOI http://dx.doi.org/10.1109/NOMS56928.2023.10154213
Abstract Intrusion detection systems (IDS) are crucial components in a defense strategy for IoT networks, as such networks have applicability in safety-critical environments such as healthcare, manufacturing, and smart cities, to name but a few. A promising approach is to train IDS models using machine learning (ML) with data from previous attacks. Unfortunately, the models are only as good as the data provided in the training, and often access to realistic attack data is limited. In this paper we focus on Blackhole attacks in low-power and lossy IoT networks. Specifically, we study the impact of Blackhole attack variations on a ML-based IDS. We implemented the variation strategies in the Cooja network simulator, with the objective to create new data sets and to quantity the impact of an attack variation on the network and IDS model performance. Our initial results show that variations of the Blackhole attack have a negative impact on the performance of the IDS, and thus, paves the way forward for further research on how attack variations and corresponding data set complexity can improve the performance of an IDS. © 2023 IEEE.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
30308 View0.924Kaveh A.; Rohner C.; Johnsson A.Impact Of Attack Variations And Topology On Iot Intrusion Detection Model GeneralizabilityProceedings - 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems, MASS 2024 (2024)
33346 View0.889Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
37199 View0.885Al-Ambusaidi M.; Yinjun Z.; Muhammad Y.; Yahya A.Ml-Ids: An Efficient Ml-Enabled Intrusion Detection System For Securing Iot Networks And ApplicationsSoft Computing, 28, 2 (2024)
36080 View0.884Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
47766 View0.884Plazas Olaya M.K.; Vergara Tejada J.A.; Aedo Cobo J.E.Securing Microservices-Based Iot Networks: Real-Time Anomaly Detection Using Machine LearningJournal of Computer Networks and Communications, 2024 (2024)
32898 View0.881Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
33508 View0.877Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
6670 View0.876Zhukabayeva T.; Benkhelifa E.; Satybaldina D.; Rehman A.U.Advancing Iot Security: A Review Of Intrusion Detection Systems Challenges And Emerging Solutions2024 11th International Conference on Software Defined Systems, SDS 2024 (2024)
36064 View0.876Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
23579 View0.875Prazeres N.; Costa R.L.D.C.; Santos L.; Rabadão C.Engineering The Application Of Machine Learning In An Ids Based On Iot Traffic FlowIntelligent Systems with Applications, 17 (2023)