Abstract
Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial multimedia environment is used for the collection and analysis of different types of multimedia data (i.e., images, videos, audios, etc.). This multimedia data is generated by various types of smart devices like drones, robots, smart controller, smart surveillance system which are deployed for the industrial monitoring and control. The multimedia data is generated in the enormous amount which can be considered as the big data. This data is further utilized in various types of business needs for example, chances of fire accidents in the industrial plant, overall machine health, etc., which can be predicted through the application of big data analytics. Therefore, IoT-enabled industrial multimedia environment is very helpful to the concerned authorities as they come to know the important information in advance. However, all the smart devices are connected and controlled through the Internet. It further causes severe threats to the communication happens in an IoT-enabled industrial multimedia environment. It is vulnerable to various types of attacks such as replay, man-in-the-middle, impersonation, secret information leakage, sensitive information modification, and malware injection (i.e., mirai). Therefore, it is important to prevent the communication of such an environment against the different types of possible attacks. These days, the attacks performed by botnets (i.e., malware attacks such as mirai and reaper) have drawn attention to the researchers. Under the influence of such attacks, the communication of IoT-enabled industrial multimedia environment is disrupted. Moreover, the attackers may also control the smart devices remotely and can change their functionalities. Hence, we need some robust mechanism to detect the presence of the malware attacks in such an environment. In this paper, we propose a malware detection mechanism in IoT-enabled industrial multimedia environment with the help of machine-learning approach, which is named as MADP-IIME. MADP-IIME uses four different types of machine learning methods (i.e., naive bayes, logistic regression, artificial neural networks (ANN) and random forest) to detect the presence of malware attacks successfully. Furthermore, MADP-IIME performs better than other related existing schemes and achieves \(99.5 \%\) detection and \(0.5 \%\) false positive rate. In addition, the conducted security analysis proves the resilience of the proposed MADP-IIME against different types of malware attacks.
Similar content being viewed by others
References
Ahmed, S., Ali, A., Abbas, J., Hadi, L.: Intelligent intrusion detection in low-power IoTs. ACM Trans Internet Technol. 16(4), 1–25 (2016)
Al-Turjman, F., Alturjman, S.: 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications. Multimed Tools Appl 79(13), 8627–8648 (2020)
Alaparthy, V.T., Morgera, S.D.: A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6, 47364–47373 (2018)
Alladi, T., Chamola, V., Sikdar, B., Choo, K.R.: Consumer IoT: security vulnerability case studies and solutions. IEEE Consumer Electron Mag 9(2), 17–25 (2020)
Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput Commun 155, 1–8 (2020)
Breitenbacher, D., Homoliak, I., Aung, Y.L., Tippenhauer, N.O., Elovici, Y.: HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. ACM Asia Conference on Computer and Communications Security. Asia CCS ’19, pp. 479–484. Auckland, New Zealand (2019)
Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3), 2671–2701 (2019)
Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E., Yoo, K.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)
Chen, M., Challita, U., Saad, W., Yin, C., Debbah, M.: Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE commun Surv Tutorials 21(4), 3039–3071 (2019)
Cheng, Q., Varshney, P.K., Arora, M.K.: Logistic regression for feature selection and soft classification of remote sensing data. IEEE Geosci Rem Sens Lett 3(4), 491–494 (2006)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans Inf Theory 29(2), 198–208 (1983)
Ethhack: What’s a botnet? When armies of contaminated IoT gadgets assault. Available at https://ethhack.com/2019/06/ what-is-a-botnet-when-armies-of- infected-iot-devices-attack-2/. Accessed on October 2019 (2019)
Ganiz, M.C., George, C., Pottenger, W.M.: Higher order Nave Bayes: a novel non-IID approach to text classification. IEEE Trans Knowl Data Eng 23(7), 1022–1034 (2011)
Han, X., Wang, L., Xu, S., Zhao, D., Liu, G.: Recognizing roles of online illegal gambling participants: an ensemble learning approach. Comput Secur 87(101), 588 (2019)
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)
Ilascu, I.: New Echobot Botnet Variant Uses Over 50 Exploits to Propagate (2019). https://www.bleepingcomputer.com/news/ security/new-echobot-botnet-variant-uses-over-50-exploits-to-propagate/. Accessed October 2019
Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7, 42450–42471 (2019)
Jeon, G., Damiani, E., Anisetti, M.: Computational intelligence for multimedia and industrial applications. Multimed Tools Appl 76(23), 24589–24593 (2017)
Jiang, L., Zhang, H., Cai, Z.: A Novel Bayes Model: hidden Naive Bayes. IEEE Trans Knowl Data Eng 21(10), 1361–1371 (2009)
Kambourakis, G., Kolias, C., Stavrou, A.: The Mirai botnet and the IoT Zombie Armies. In: IEEE Military Communications Conference (MILCOM), pp. 267–272. Baltimore, USA (2017)
Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., Kim, H.K.: IoT network intrusion dataset (2019). https://doi.org/10.21227/q70p-q449. Accessed January 2020
Kelley, T., Furey, E.: Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control. In: 29th Irish Signals and Systems Conference (ISSC), pp. 1–6. Belfast, Ireland (2018)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and Other Botnets. Computer 50(7), 80–84 (2017)
Korolov, M.: What is a botnet? When armies of infected IoT devices attack. https://www.csoonline.com/ article/3240364/ what-is-a-botnet.html. Accessed October 2019 (2019)
Kumar, A., Lim, T.J.: EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. In: 5th World Forum on Internet of Things (WF-IoT), pp. 289–294. Limerick, Ireland (2019)
Larose, D.T.: Logistic Regression. In: Data Mining Methods and Models, pp. 155–203 (2006). https://doi.org/10.1002/0471756482.ch4
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gen Comput Syst 96, 481–489 (2019)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5), 541–552 (2002)
Mudgerikar, A., Sharma, P., Bertino, E.: E-spion: A system-level intrusion detection system for iot devices. ACM Asia Conference on Computer and Communications Security. Asia CCS ’19, pp. 493–500. Auckland, New Zealand (2019)
Nandi, A.K., Ahmed, H.: Artificial Neural Networks (ANNs). In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 239–258. IEEE (2019). Doi:https://doi.org/10.1002/9781119544678.ch12
Nandi, A.K., Ahmed, H.: Decision Trees and Random Forests. In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 199–224 (2019)
Nowozin, S., Gehler, P.V., Jancsary, J., Lampert, C.H.: Training Structured Predictors Through Iterated Logistic Regression. In: Advanced Structured Prediction, pp. 213–238. MITP (2014). https://ieeexplore.ieee.org/document/7008219
Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2), 314–323 (2019)
Semic, H., Mrdovic, S.: IoT honeypot: A multi-component solution for handling manual and Mirai-based attacks. In: 25th Telecommunication Forum (TELFOR), pp. 1–4. Belgrade, Serbia (2017)
Sharma, V., You, I., Yim, K., Chen, I., Cho, J.: Briot: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 556–580 (2019)
Sinanovi, H., Mrdovic, S.: Analysis of Mirai malicious software. 25th International Conference on Software. Telecommunications and Computer Networks (SoftCOM), pp. 1–5. Split, Croatia (2017)
Singh, A., Mahapatra, S.: Network-Based Applications of Multimedia Big Data Computing in IoT Environment. In: S. Tanwar, S. Tyagi, N. Kumar (eds.) Multimedia Big Data Computing for IoT Applications, chap. 17, pp. 435–452. Springer, Singapore (2020)
Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J 18(5), 1971–1984 (2018)
Tickle, A.B., Andrews, R., Golea, M., Diederich, J.: The truth will come to light: directions and challenges in extracting the knowledge embedded within trained artificial neural networks. IEEE Trans Neural Netw 9(6), 1057–1068 (1998)
Verma, G.K., Singh, B.B., Kumar, N., Chamola, V.: CB-CAS: certificate-based efficient signature scheme with compact aggregation for industrial Internet of Things environment. IEEE Internet Things J 7(4), 2563–2572 (2020)
Wang, S.S., Yan, K.Q., Wang, S.C., Liu, C.W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Expert Syst Appl 38(12), 15234–15243 (2011)
Wang, Y., Fu, W., Agrawal, D.P.: Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2), 342–355 (2013)
Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mobile Comput 7(6), 698–711 (2008)
Wazid, M., Das, A.K.: An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks. Wirel Pers Commun 90(4), 1971–2000 (2016)
Wazid, M., Das, A.K.: A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3), 1165–1191 (2017)
Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur Commun Netw 9(17), 4596–4614 (2016)
Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput (2017). https://doi.org/10.1109/TDSC.2017.2764083
Wazid, M., Das, A.K., Rodrigues, J.J.P.C., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 459–476 (2019)
Wazid, M., Das, A.K., Shetty, S., Rodrigues, J., Park, Y.: LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24), 5539 (2019)
Wazid, M., Reshma Dsouza, P., Das, A.K., Bhat, K. V., Kumar, N., Rodrigues, J.J.P.C.: RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. International Journal of Communication Systems 32(15), e4024 (2019)
Wlas, M., Krzeminski, Z., Guzinski, J., Abu-Rub, H., Toliyat, H.A.: Artificial-neural-network-based sensorless nonlinear control of induction motors. IEEE Trans Energy Convers 20(3), 520–528 (2005)
Zhao, L., Dong, X.: An industrial internet of things feature selection method based on potential entropy evaluation criteria. IEEE Access 6, 4608–4617 (2018)
Zhao, Y., Li, Y., Zhang, X., Geng, G., Zhang, W., Sun, Y.: A survey of networking applications applying the software defined networking concept based on machine learning. IEEE Access 7, 95397–95417 (2019)
Zikria, Y.B., Afzal, M.K., Kim, S.W.: Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. Sensors 20(8) (2020). https://www.mdpi.com/1424-8220/20/8/2334
Acknowledgements
The authors would like to thank the anonymous reviewers and the Editor for their valuable feedback. This work is supported in part by PR of China Ministry of Education Distinguished Possessor Grant given to Prof. Obaidat under number: MS2017BJKJ003. This work was also partially supported in part by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/50008/2020; and in part by Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pundir, S., Obaidat, M.S., Wazid, M. et al. MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach. Multimedia Systems 29, 1785–1797 (2023). https://doi.org/10.1007/s00530-020-00743-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-020-00743-9