Comparison of Machine Learning Algorithms to Detect RPL-Based IoT Devices Vulnerability

Simulation and Raw Data

In this thesis study, experiments will be conducted on Flooding Attacks, Version Number Increase Attacks and Decreased Rank Attacks that may occur in the RPL protocol and a data set will be created. For this purpose, the following stages will be followed:

  • For each attack, simulating with benign IoT devices (nodes) and recording network packet data,
  • For each attack, simulating devices (nodes) containing malicious IoT devices and recording network packet data,
  • For each attack, making sense of the network packet data obtained, classifying the network packets data containing the malicious node with the label “1”, and the data of network packets containing the benign node with the label “0”. Thus, the creation of 3 classified data sets,
  • For each attack, separating the classified data sets as test and training data sets, performing the normalization process,
  • Training the training data set allocated for each attack with 6 different machine learning algorithms,
  • Testing the test data set allocated for each attack with 6 different machine learning algorithms, determining the accuracy rates, and training times
  • Comparison of results.

Simulation of Attacks

For the simulation of attacks, the Contiki operating system was used. In the next sections, how to install this operating system, how to create vulnerable and normal nodes, how to do the simulation and obtain raw data, how to process the raw data and train the data set obtained with machine learning algorithms.

Blog summary

Under this title, experiments will be conducted on Flooding Attacks, Version Number Increase Attacks and Decreased Rank Attacks that may occur in the RPL protocol and a data set will be created. For this purpose, the following stages will be followed:

About the Author

Other Posts

My Thesis
Murat Ugur KIRAZ

Conclusion

In this blog post, the Flooding Attack, Decreased Rank Attack and Version Number Increase Attack in the RPL protocol were trained and detected by “Decision Tree”, “Logistic Regression”, “Random Forest”, “Naive Bayes”, “K Nearest Neighbor” and “Artificial Neural Networks” algorithms.

The test results for the attacks were compared, as a result of the comparison, the Artificial Neural Networks algorithm with an accuracy rate of 97.2% in the detection of Flooding Attacks, the K Nearest Neighbor algorithm with an accuracy rate of 81% in the detection of Version Number Increase Attacks, and the Artificial Neural Networks with an accuracy rate of 58% in the detection of Decreased Rank attacks algorithm has been found to show success.

Read More »
My Thesis
Murat Ugur KIRAZ

Interpretation of Machine Learning Values

I continue to share how I did my master’s thesis titled Comparison of Machine Learning Algorithms for the Detection of Vulnerability of RPL-Based IoT Devices, my experiences in this process, and the codes in this thesis in a series of articles on my blog.

So far, I have provided detailed information about the RPL protocol and the attacks that take place in the RPL protocol. Then, I experimented with Flooding Attacks, Version Number Increased Attack, and Decreased Rank Attack, extracting the raw data and making sense of that raw data. I compared the results of experiments with weak knots with statistical methods.

In this section, I will interpret the numerical results of the attacks we detect with machine learning algorithms.

Read More »

Share this post

LinkedIn
Twitter