<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Machine Learning-based Intrusion Detection System Against Routing Attacks in the Internet of Things</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Abdelhammid</forename><surname>Bouazza</surname></persName>
							<email>abdelhamid.bouazza@univ-msila.dz</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of M&apos;sila</orgName>
								<address>
									<settlement>M&apos;sila</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hichem</forename><surname>Debbi</surname></persName>
							<email>hichem.debbi@univ-msila.dz</email>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of M&apos;sila</orgName>
								<address>
									<settlement>M&apos;sila</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hicham</forename><surname>Lakhlef</surname></persName>
							<email>hicham.lakhlef@utc.fr</email>
							<affiliation key="aff2">
								<orgName type="department">Sorbonne Universités</orgName>
								<orgName type="institution" key="instit1">Université de Technologie de Compiègne CNRS</orgName>
								<orgName type="institution" key="instit2">HEUDIASYC UMR 7253CS</orgName>
								<address>
									<postCode>60319, 60203</postCode>
									<settlement>Compiègne Cedex</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Machine Learning-based Intrusion Detection System Against Routing Attacks in the Internet of Things</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E7FD8A557174939CFB121B26E1634917</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T07:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Internet of things</term>
					<term>Security</term>
					<term>Intrusion detection system</term>
					<term>Machine learning</term>
					<term>RPL attacks</term>
					<term>Cooja</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Internet of things (IoT) applications are growing daily, as they are being used in many areas and systems, and as their uses and modes of employment increase, there are many gaps with them. Security is one of the most challenging problems in IoT. IoT is composed of a considerable number of connected devices. Therefore, mobile data traffic is significant, and routing protocols are needed. IoT has many routing protocols; the most widely used is the RPL protocol, which considers limited power and the device's capabilities. Still, it suffers from several weaknesses. The most important one is routing-based attacks which target this protocol. In this work, we aim to solve the problem of Internet of Things exposure to RPL-based attacks as a routing protocol. We built an anomaly intrusion detection system based on Machine learning and an IoT attacks dataset. This dataset, which is generated through the Cooja simulator, contains the most critical attacks and implementation of different scenarios that allowed for the extraction of essential features, in addition to new sensitive features such as nodes' power and their geographical location. Furthermore, we fix minority classes (rare attacks) by balancing the dataset. The results were satisfying because they decreased the false alert rate percentage and maximised accuracy and precision.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Background</head><p>The Internet of Things (IoT) is a network of commonplace physical things that may connect to the Internet to communicate and collect data utilizing the abilities of the network. These things (nodes) are the digital sensors or networked equipment that can exchange this data via the worldwide Internet. New applications and services are produced due to sensors, connectivity, people, and process interactions. The "Things" in the Internet of "Things" are these electronic gadgets or sensors. Connecting to the Internet via protocols of rootage helps improve quality of life. Each node can reach other nodes and exchange routing information using RPL (Routing Protocol for Low Power and Lossy Networks). However, due to its adhoc and limited resource structure <ref type="bibr" target="#b0">[1]</ref>, IoT systems are very sensitive to intrusions. Attacks usually target a node connected to a large data stream's usability and energy consumption. Attack detection systems are one of the security measures and are crucial in an IoT ecosystem. RPL is a novel distance vector routing protocol standardized for constrained 6LoWPAN networks enabling nodes to communicate in a mesh topology. Moreover, several attacks exist on the RPL protocol that target a node's availability, and increase dramatically its power consumption.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Research problem</head><p>The biggest obstacle to routing in the internet of things is security. IoT networks struggle because they lack proven and defined design principles like the client-server paradigm. This shortcoming makes it impossible to use a wide range of conventional security solutions in IoT networks. As a result, IoT is becoming a profitable platform for various Internet assaults as the number of IoT devices rises. These attacks may take many shapes and target various resources on various IoT devices. For a secure IoT Environment, ongoing monitoring and analysis are required.</p><p>ML is an effective method that can be applied to cyber security.</p><p>2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3">Research objectives</head><p>This research aims to develop an ML-based IDS for detecting routing assaults in IoT. This study concentrated on certain IoT routing attacks. The Cooja simulator is used to mimic each of these threats using actual circumstances. In addition to accuracy and precision, we strive to reduce the false alarm rate as much as possible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related studies and background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Intrusion detection systems</head><p>IDS scan a computer or a network for irregularities that could be a signal of an intrusion. When they identify unusual activity, intrusion detection systems often notify an administrator <ref type="bibr" target="#b1">[2]</ref>. The two fundamental kinds of intrusion detection systems are host-based IDS (HIDS) and network-based IDS (NIDS), with the key distinctions being the IDS's location and intended use. HIDS inspect data stored on specific hosts' computers, while NIDS can monitor the network and look for suspicious activity.</p><p>It can be a misuse or anomaly detection. 1. Misuse detection: In order to detect common attacks, misuse-based intrusion detection uses a database of known signatures and patterns <ref type="bibr" target="#b2">[3]</ref>. 2. Anomaly detection: Using data from regular users, an anomaly-based intrusion detection approach constructs a normal data pattern, and then compares it with current patterns online to find abnormalities <ref type="bibr" target="#b3">[4]</ref>. In IoT-based setups, IDS algorithms based on anomalies may be utilized depending on complexity, execution time, and detection time requirements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">RPL protocol mechanism</head><p>By sending a DIO (Dodag Information Object) message to its neighbours, the root node begins the construction of a DODAG (Destination Oriented Directed Acyclic Graph), which contains node rank information to allow it to take its position in the DODAG and prevent steering loops. As a result, each node that receives a DIO message must determine whether or not it wishes to join the DODAG based on its intended use. Upon joining the DODAG, a node will have a path up to the root. After calculating its rank, it updates its neighbour table, and chooses the better father who will be used to redirect messages. DIO messages must be processed by every node in the network until all nodes are accessed. DODAG can be joined at any time by new nodes through RPL. By using the DIS (Dodag information solicitation) message, the new node requests the DIO message from a node within the DODAG. The new node identifies its best father by receiving the DIO message following the OF (Objective function). The nodes send DIO messages periodically to keep the network stable when the node is already connected to the DODAG and then receives a new DIO message, which will be processed in three different ways:</p><p>1. Drop the DIO message according to some rules defined by RPL. 2. Process the DIO message to keep her position in the DODAG 3. Update her position by choosing new parent according to the OF, in this case the node must update parent list to avoid DODAG routing loops.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">RPL attacks</head><p>IoT applications exist in a variety of domains, including healthcare systems, smart homes, smart cities, smart energy monitoring etc. Due to this variety of applications, routing attacks pose a serious threat to IoT security <ref type="bibr" target="#b5">[6]</ref>. RPL is a distance-based protocol. Each network node determines its routing path prior to the initialization of the RPL network. RPL is a tree-based IPv6 routing system for 6LoWPAN that produces Destination Oriented Directed Acyclic Graphs (DODAGs), commonly known as a DODAG tree. The DODAG ID for identification is assigned to each network's root node. Rank numbers and routing tables are also assigned to nodes based on their rank numbers. Nodes are ranked according to their distance from the root <ref type="bibr" target="#b6">[7]</ref>.</p><p>Depending on the type of vulnerability they seek to exploit, RPL attacks can be divided into topology, resource categories, and traffic categories. Energy and power are depleted, and memory is overwhelmed by resource-based assaults. Attacks based on topology disrupt network operations. Consequently, one or more nodes might be disconnected from the network.</p><p>In addition, these attacks pose a threat to the network's original topology. Lastly, traffic-based attackers attempt to join the network as normal nodes <ref type="bibr" target="#b4">[5]</ref>. Attackers then use network traffic information to conduct attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">HELLO Flooding attack:</head><p>A flooding attack is one type of DoS attack, where the malicious nodes send false packets in the network to wear the resources and interrupt the network's working condition. Based on the packet utilized for flooding the network <ref type="bibr" target="#b7">[8]</ref>. 2. Decreased rank attack: Other nodes are publicized lower than their original rank by malicious nodes. Due to this, several nodes choose illegitimate nodes as their preferred parents. According to WSN attacks <ref type="bibr" target="#b8">[9]</ref>, this is a sinkhole attack. 3. Version number attack: The attacks aim to increase the version number field inside the DIO messages and transmit them to its neighbours. As a result, a new DODAG construct is forced to cause data packet loss, network congestion, and node resource exhaustion due to control message overhead <ref type="bibr" target="#b9">[10]</ref>. 4. Blackhole attack : A Blackhole attack in a network would mean that one or more malicious nodes would drop all or part of the data packets being routed through it, causing disruptions in the normal flow of data through the network. A malicious node will distort routing information, present itself as the best path to the control node (called a node sink), and force data through itself <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Related works</head><p>This section provides an overview of studies on detecting routing attacks in the Internet of Things using intrusion detection systems.</p><p>In <ref type="bibr" target="#b11">[12]</ref>, the authors have given proof of concept for using deep learning in IoT. First, a method for detecting routing attacks for IoT was given based on deep learning. Nonetheless, the datasets were not enough, and the existing data was very poor in terms of quality; which is considered to be the major problem in IoT.</p><p>The authors have also proposed a clearly scalable attack detection methodology based on in-deeplearning for the detection of IoT routing attacks that are a restricted category, hello-flood type, and version number modification attacks with great precision and accuracy. Furthermore, they have built a deep neural network of models formed using IRAD datasets.</p><p>In <ref type="bibr" target="#b12">[13]</ref>, the authors used Contiki-Cooja to simulate RPL attacks and four different attacks. The researchers chose four attacks to implement the experiment: a "hello flood" attack, a "DODAG Information Solicitation" attack, an "increased version" attack, and a "reduced rank" attack. Later on, a new machine learning model was proposed based on characteristics extracted from network traffic packets, and while using the selected features. Three different classifiers were determined to be more efficient in detecting various attacks, including Naive Bayes, Random Forests, and C4.5. Lastly, their experimental results showed that they could achieve 99.33% classification accuracy using the Random-forest classifier.</p><p>In <ref type="bibr" target="#b13">[14]</ref>, the authors proposed an "IDS '' intrusion detection system for smart hospitals. When doing so, they have offered an RPL attack detection system based on anomalies against an IoT network and especially the RPL using support vector machines. The authors considered Hospitals to be an interesting case study, in which many challenges can be faced, such as resiliency of services, interoperability of assets and protection of sensitive information. Throughout the case study, a set of simulation scenario took place. In the first scenario the IoT network didn't include any malicious mote, in the second scenario the IoT network had 1 malicious mote randomly placed, in the third scenario, the IoT network had two malicious motes randomly place, and lastly on the fourth scenario, the IoT network had 4 malicious motes randomly placed.</p><p>The Selected IDS is centralized and uses an SVM machine learning algorithm to identify abnormalities. In order to assess the precision of the proposed IDS, the researchers employed energy consumption as a metric and gathered data for monitoring power per motes in terms of radio energy, receive radio energy, radio transmission energy, and interfered INT radio energy. The observed findings indicate that, as the number of malicious nodes rises, the technique will become more efficient and precise in terms of detection accuracy.</p><p>In <ref type="bibr" target="#b14">[15]</ref>, the authors presented distributed IoT threat detection based on deep learning. They have later on evaluated the performance of classical machine learning and deep learning for detecting distributed attacks. This work performs distributed attack detection via fog computing <ref type="bibr" target="#b15">[16]</ref>. In addition, they employed the NSL-KDD <ref type="bibr" target="#b16">[17]</ref> dataset to identify assaults. Although this research presents a potential solution for distributed deep learning, it does not particularly address IoT threats.</p><p>In <ref type="bibr" target="#b17">[18]</ref>, the authors have used unsupervised pre-training using SAE (sparse auto encoding) and DNN classifier. An accuracy of 99.65%was reached, and the final model used was AN ID against Clone ID attack.</p><p>Comparison with Related Work. To our knowledge, we are the only ones that Added new features (Rank, geographical position), and we studied the attacks' principal to build a global data set valid for any IoT RPL routing attack that adopts data balancing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Proposed model and dataset collection</head><p>There are limited datasets available and the quality of available data is poor. Using real scenarios and sensors, we produced our dataset through simulation, and we implemented the Cooja simulator. Here is a summary of how the dataset was built:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Traffic capture</head><p>We captured all the traffic that went through the IoT network with different scenarios as a PCAP file by Wireshark with the help of a ready tool in the Cooja simulator named radio messages. PCAP file is converted to a CSV file. All the simulation is divided into a window time of 1000ms, which means in each second, we have captured some packets. The algorithm used is described in Figure <ref type="figure" target="#fig_2">3</ref>.</p><p>Raw data sets include data types, such as IP addresses, that the learning algorithm cannot comprehend, causing the model to overfit. Source and destination IPv6 addresses are transformed to node ID to circumvent this issue. For example: IPV6 address 2001:0db8:3cd4:0015:0000:d234::3eee:0011 can be shortened to 11 and the broadcast IP address ff02::1a is converted to 99.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Generate new features</head><p>All the previous steps generated a total of 13 features from 6 features at the beginning.</p><p>The transmission and reception time of each packet is calculated. The full length of each packet's delivery and reception is 1000 milliseconds. We then determined the average emission and receiving time for each node, and the number of control packets transmitted from each node (concern the control packets: DAO, DIO and DIS) is calculated in windowing size, 1000 ms. Those values impacted attack detection like Hello Flooding because, in this attack, the transmission rate should be higher. The algorithm used is shown in figure <ref type="figure" target="#fig_2">3</ref> below:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Energy Tracking</head><p>We tracked the power of the nodes without attacks, and we found that the attacks consumed the energy of the nodes greatly. Using the simulator, four properties were derived: energy (ON), emission mode (radio TX), reception mode (radio RX) and finally INT (interfered radio).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Position and rank tracking</head><p>By changing of position (X, Y) and rang (rank) of the nodes, we discovered that malicious nodes always take an important geographical position and are close to the root node to cover and influence as many nodes as possible. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Dataset description</head><p>This RPL attacks dataset contains 24 features and 48024 samples. In tables 1 and 2 below, we will describe all details:   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.6">Proposed Model</head><p>In this paper, we present a technique for discovering routing-based attacks in IoT networks based on the behaviour-based detection of intrusions provided by machine learning. We determined, using the Contiki Cooja simulator, several network scenarios. Then, we built our dataset using important parameters to detect routing attacks in IoT networks, which is necessary to create our IDS.</p><p>Data imbalance refers to a disproportionate distribution of classes within a dataset. If a model is trained under an imbalanced dataset <ref type="bibr" target="#b18">[19]</ref>, it will become biased and rare attacks are a bad problem. By balancing the dataset, the effectiveness of the model will be improved.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.7">Dataset balancing</head><p>There are 28922 normal samples and 19102 attack samples in the data set. As demonstrated in Table <ref type="table" target="#tab_0">1</ref>, more than sixty percent of the samples fall within normal categories. In this manner, the learning model will predict the majority classes but not the minority classes, indicating that it is biased. Various resampling methods <ref type="bibr" target="#b20">[21]</ref> have been proposed to address this issue, including random oversampling, which randomly replicates exact samples of minority classes using techniques such as the synthetic minority oversampling technique (SMOTE), the synthetic minority oversampling technique for nominal and continuous data (SMOTE-NC), and the adaptive synthetic minority oversampling technique (ADASYN). In this study, we used the ADASYN method since it is capable of managing mixed datasets of categorical and continuous features and allows us to avoid the benefits of random oversampling and SMOTE sampling. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.8">Features engineering and classification</head><p>In this step, feature transformation is applied to the training set. Continuous numerical characteristics are subjected to a min-max scaler. In addition, categorical characteristics are encoded via label encoding, which substitutes each category column with a specified number. This modification is done to the validation and testing subgroups afterwards.</p><p>Then This dataset is divided into training, validation, and testing. That contains 80% of the data for training the model, and the rest is only used to validate and test the model's performance.</p><p>Finally, we test different machine learning algorithms to classify the bidirectional flows according to the IoT environment.</p><p>We selected algorithms from among the known machine learning algorithms with initial hyperparameters to verify that a good model depends on the well of the dataset, even without being based on deep learning. They belong to four classification algorithms tested: Random Forest, Decision Tree, SVM, and Naive Bayes. The performance of the different algorithms is measured on the test set. The metrics used are accuracy, precision, and False alert rate.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results and discussion:</head><p>In this section, we have evaluated the performance of the IDS classifiers.</p><p>We have focused on Three metrics Accuracy, Precision and False alert rate.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>True positive (TP): an attack data identified as an attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>True negative (TN): a normal data identified as normal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>False positive (FP): a normal data identified as an attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>False negative (FN): an attack data identified as normal. • Accuracy = (TP+TN) / (TP+TN+FP+FN).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Precision = (TP) / (TP+FP) •</head><p>False alert rate = (FP) / (FP+TN)</p><p>We used Intel core i7-4200M CPU @2.5Ghz*4 processor with 8 GB RAM and 500 GB Hard drive to implement the detection learning algorithms.</p><p>As for software, we used Weka 3.8.6 (Machine Learning Software in Java). We used an 80/20 training/test split on this dataset, as illustrated in table <ref type="table" target="#tab_2">3</ref>. As illustrated in Table <ref type="table">4</ref>, Random Forest and Decision Tree showed its high performance for the highest accuracy and a high precision rate with a low False alert rate than SVM and Naive Bayes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 4</head><p>Overall performance on the test set of the different classifiers</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Comparative study with related works:</head><p>To evaluate our model's performance, we compared its performance with related works <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b17">18]</ref>.</p><p>The result of this comparative study is summarized in tables 5 and 6 below: The performance of our study shows a higher accuracy of 99.99% than other related work and the highest Precision and F1-score, as illustrated in Table <ref type="table">6</ref>.</p><p>These promising results are mainly due to the well-balanced dataset.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>In this work, we covered the most important attacks against the routing protocol in the Internet of Things and how it works. The security in IoT is more interested than in any other environment because when we talked about IoT, we talked about sensitive components and data. In this work, we built an intrusion detection system based on Machine learning. To train our model, we used a dataset of routing attacks. This dataset was built with the Cooja simulator, and it is based on recent papers. It contains four main attacks (BlackHole, Decreased Rank, Modification Version Number, Hello Flood). It also contains important features such as node position and energy. An effective and efficient Multi-classifier model was then built based on a Machine learning algorithm as a Random Forest after going through the most important steps of processing the dataset and using carefully selected parameters and hyperparameters to achieve good results. The results reported are mainly related to the accuracy, precision and low false alert rate. The final model has been evaluated and compared with recent works, and we got an excellent result, as shown above, that proved our model to be effective.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: RPL network example (DODAG) [5].</figDesc><graphic coords="3,166.65,217.27,303.40,183.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Taxonomy of attacks against RPL networks<ref type="bibr" target="#b4">[5]</ref> </figDesc><graphic coords="4,90.10,247.03,454.50,216.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Features extraction algorithm</figDesc><graphic coords="6,176.52,219.60,260.34,166.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Different steps to build the dataset.</figDesc><graphic coords="7,72.00,71.31,428.60,287.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Dataset before balancing</figDesc><graphic coords="8,111.80,506.63,428.20,182.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Dataset after balancing</figDesc><graphic coords="9,105.75,72.00,400.05,168.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell></cell><cell cols="2">Features description</cell><cell></cell><cell></cell><cell></cell></row><row><cell>N°</cell><cell cols="2">Feature name</cell><cell>Description</cell><cell>N°</cell><cell>Feature name</cell><cell>Description</cell></row><row><cell>1</cell><cell>T</cell><cell></cell><cell>Time</cell><cell>13</cell><cell>Length_rec</cell><cell>received Packet size</cell></row><row><cell>2</cell><cell>Src</cell><cell></cell><cell>Source</cell><cell>14</cell><cell>DIS_rec</cell><cell>Received DIS number</cell></row><row><cell>3</cell><cell>Dst</cell><cell></cell><cell>Dst Destination</cell><cell>15</cell><cell>DIO_rec</cell><cell>Received DIO number</cell></row><row><cell>4</cell><cell>Protocol</cell><cell cols="2">The upper layer protocol decoded</cell><cell>16</cell><cell>DAO_rec</cell><cell>Received DAO number</cell></row><row><cell>5</cell><cell>Dure_tr</cell><cell cols="3">Transmission time during a time window 17</cell><cell>ON_Energy</cell><cell>Energy</cell></row><row><cell>6</cell><cell>Moy_tr</cell><cell></cell><cell>Transmission media</cell><cell>18</cell><cell>TX</cell><cell>Emission energy</cell></row><row><cell>7</cell><cell>Length_tr</cell><cell></cell><cell>Transsmited Packet size</cell><cell>19</cell><cell>RX</cell><cell>Reception energy</cell></row><row><cell>8</cell><cell>DIS_tr</cell><cell></cell><cell>Trasnssmited DIS number</cell><cell>20</cell><cell>INT</cell><cell>Interfered radio</cell></row><row><cell>9</cell><cell>DIO_tr</cell><cell></cell><cell>Trasnssmited DIO number</cell><cell>21</cell><cell>Pos_x</cell><cell>X geographical Position in x axis</cell></row><row><cell>10</cell><cell>DAO_tr</cell><cell></cell><cell>Trasnssmited DAO number</cell><cell>22</cell><cell>Pos_y</cell><cell>Y geographical Position in y axis</cell></row><row><cell>11</cell><cell>Dure_rec</cell><cell cols="3">Reception time during a time window (1s) 23</cell><cell>Rang</cell><cell>Node rank in DODAG</cell></row><row><cell>12</cell><cell>Moy_rec</cell><cell></cell><cell>Reception media</cell><cell>24</cell><cell>Class</cell><cell>Attack Type</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell>Dataset information</cell><cell></cell><cell></cell></row><row><cell>Normal/Attack</cell><cell>Category</cell><cell>Records Number</cell></row><row><cell></cell><cell>Decreased rank</cell><cell>9 367</cell></row><row><cell>Attack</cell><cell>Version Number Black Hole</cell><cell>3 196 1 493</cell></row><row><cell></cell><cell>Hello Flooding</cell><cell>5 046</cell></row><row><cell>Normal</cell><cell></cell><cell>28922</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc></figDesc><table><row><cell>train, and test set</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Training</cell><cell>Test</cell></row><row><cell>Black</cell><cell>22 946</cell><cell>5 859</cell></row><row><cell>Rank</cell><cell>23 922</cell><cell>5 896</cell></row><row><cell>Version</cell><cell>22 199</cell><cell>5 579</cell></row><row><cell>Hello</cell><cell>23 027</cell><cell>5 719</cell></row><row><cell>Normal</cell><cell>23 161</cell><cell>5 761</cell></row><row><cell>Total</cell><cell>115 255</cell><cell>2 8814</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 5</head><label>5</label><figDesc></figDesc><table><row><cell>Classifier</cell><cell>Accuracy</cell><cell>precision</cell><cell>False alert rate</cell><cell></cell></row><row><cell>Random Forest</cell><cell>0.999</cell><cell>0.999</cell><cell>0.001</cell><cell></cell></row><row><cell>Decision Tree</cell><cell>0.999</cell><cell>0.999</cell><cell>0.001</cell><cell></cell></row><row><cell>Naive Bayes</cell><cell>0.984</cell><cell>0.962</cell><cell>0.010</cell><cell></cell></row><row><cell>SVM</cell><cell>0,958</cell><cell>0,896</cell><cell>0.026</cell><cell></cell></row><row><cell cols="2">comparison with used dataset in each work</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Attack</cell><cell>Dataset</cell><cell>ML/DL</cell><cell>Features</cell></row><row><cell>[12]</cell><cell>3</cell><cell>Pcap file</cell><cell>DL</cell><cell>18</cell></row><row><cell>[13]</cell><cell>4</cell><cell>Pcap file</cell><cell>ML</cell><cell>21</cell></row><row><cell>[18]</cell><cell>1</cell><cell>Pcap file</cell><cell>DL</cell><cell>19</cell></row><row><cell>Our dataset</cell><cell>4</cell><cell>Pcap file, Energy, Position</cell><cell>ML</cell><cell>23</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Accuracy</head><p>Precision False alert rate F1-score <ref type="bibr" target="#b11">[12]</ref> 0.949 0.957 / 0.957 <ref type="bibr" target="#b12">[13]</ref> 0.993 0.994 / / <ref type="bibr" target="#b17">[18]</ref> 0.996 / / 0.996 Our model 0.999 0.999 0.001 0.997</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Rpl attack detection and prevention in the internet of things networks using a gru based deep learning</title>
		<author>
			<persName><forename type="first">S</forename><surname>Cakir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Toklu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Yalcin</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3029191</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="183678" to="183689" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">On the Use of Belief Functions to Improve High Performance Intrusion Detection System</title>
		<author>
			<persName><forename type="first">A</forename><surname>Abdelkader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Youcef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hadjali</surname></persName>
		</author>
		<idno type="DOI">10.1109/SITIS.2016.50</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings -12th International Conference on Signal Image Technology and Internet-Based Systems</title>
				<meeting>-12th International Conference on Signal Image Technology and Internet-Based Systems<address><addrLine>SITIS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-04">2016. Apr. 2017</date>
			<biblScope unit="page" from="266" to="270" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Improving network intrusion detection system performance through quality of service configuration and parallel technology</title>
		<author>
			<persName><forename type="first">W</forename><surname>Bul'ajoul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>James</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pannu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jcss.2014.12.012</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Computer and System Sciences</title>
		<imprint>
			<biblScope unit="volume">81</biblScope>
			<biblScope unit="issue">6</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Network anomaly detection: Methods, systems and tools</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Bhuyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Bhattacharyya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Kalita</surname></persName>
		</author>
		<idno type="DOI">10.1109/SURV.2013.052213.00046</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys and Tutorials</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A taxonomy of attacks in RPL-based internet of things</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mayzaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Badonnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Chrisment</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Network Security</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Routing attacks and countermeasures in the RPL-based internet of things</title>
		<author>
			<persName><forename type="first">L</forename><surname>Wallgren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Raza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Voigt</surname></persName>
		</author>
		<idno type="DOI">10.1155/2013/794326</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Distributed Sensor Networks</title>
		<imprint>
			<biblScope unit="volume">2013</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Fuqaha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guizani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mohammadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aledhari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ayyash</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMST.2015.2444095</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys and Tutorials</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm</title>
		<author>
			<persName><forename type="first">T</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Aditya</forename><surname>Sai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Srinivas</forename></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Manivannan</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.comcom.2020.03.031</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">163</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Routing Attacks and Mitigation Methods for RPL-Based Internet of Things</title>
		<author>
			<persName><forename type="first">A</forename><surname>Raoof</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Matrawy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Lung</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMST.2018.2885894</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys and Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A study of RPL DODAG version attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mayzaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sehgal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Badonnel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Chrisment</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Schönwälder</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-43862-6_12</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">8508</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Case study of a black hole attack on LoWPAN-RPL</title>
		<author>
			<persName><forename type="first">K</forename><surname>Chugh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aboubaker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Loo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)</title>
				<meeting>of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)<address><addrLine>Rome, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012-08">August 2012. 2012</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="157" to="162" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Deep learning for detection of routing attacks in the internet of things</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">Y</forename><surname>Yavuz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ünal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Gül</surname></persName>
		</author>
		<idno type="DOI">10.2991/ijcis.2018.25905181</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computational Intelligence Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Simulating Attacks for RPL and Generating Multiclass Dataset for Supervised Machine Learning</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Elmiligi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Gebali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Verma</surname></persName>
		</author>
		<idno type="DOI">10.1109/IEMCON.2019.8936142</idno>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Said</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yahyaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yaakoubi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Abdellatif</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-51517-1_3</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">12157</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Distributed attack detection scheme using deep learning approach for Internet of Things</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Diro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Chilamkurti</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.future.2017.08.043</idno>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">82</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Fog Computing for the Internet of Things: Security and Privacy Issues</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alrawais</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alhothaily</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Cheng</surname></persName>
		</author>
		<idno type="DOI">10.1109/MIC.2017.37</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Computing</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">A detailed analysis of the KDD CUP 99 data set</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tavallaee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bagheri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
		<idno type="DOI">10.1109/CISDA.2009.5356528</idno>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A dense neural network approach for detecting clone id attacks on the rpl protocol of the iot</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Morales-Molina</surname></persName>
		</author>
		<idno type="DOI">10.3390/s21093173</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">9</biblScope>
			<date type="published" when="2021-05">May 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Derhab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aldweesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Z</forename><surname>Emam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.1155/2020/6689134</idno>
	</analytic>
	<monogr>
		<title level="j">Wireless Communications and Mobile Computing</title>
		<imprint>
			<biblScope unit="volume">2020</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">An Overview Optimization Gradients</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ruder</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1609.04747</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Handling imbalanced datasets : A review</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kotsiantis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kanellopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pintelas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
