Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach

  • Special Issue Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial multimedia environment is used for the collection and analysis of different types of multimedia data (i.e., images, videos, audios, etc.). This multimedia data is generated by various types of smart devices like drones, robots, smart controller, smart surveillance system which are deployed for the industrial monitoring and control. The multimedia data is generated in the enormous amount which can be considered as the big data. This data is further utilized in various types of business needs for example, chances of fire accidents in the industrial plant, overall machine health, etc., which can be predicted through the application of big data analytics. Therefore, IoT-enabled industrial multimedia environment is very helpful to the concerned authorities as they come to know the important information in advance. However, all the smart devices are connected and controlled through the Internet. It further causes severe threats to the communication happens in an IoT-enabled industrial multimedia environment. It is vulnerable to various types of attacks such as replay, man-in-the-middle, impersonation, secret information leakage, sensitive information modification, and malware injection (i.e., mirai). Therefore, it is important to prevent the communication of such an environment against the different types of possible attacks. These days, the attacks performed by botnets (i.e., malware attacks such as mirai and reaper) have drawn attention to the researchers. Under the influence of such attacks, the communication of IoT-enabled industrial multimedia environment is disrupted. Moreover, the attackers may also control the smart devices remotely and can change their functionalities. Hence, we need some robust mechanism to detect the presence of the malware attacks in such an environment. In this paper, we propose a malware detection mechanism in IoT-enabled industrial multimedia environment with the help of machine-learning approach, which is named as MADP-IIME. MADP-IIME uses four different types of machine learning methods (i.e., naive bayes, logistic regression, artificial neural networks (ANN) and random forest) to detect the presence of malware attacks successfully. Furthermore, MADP-IIME performs better than other related existing schemes and achieves \(99.5 \%\) detection and \(0.5 \%\) false positive rate. In addition, the conducted security analysis proves the resilience of the proposed MADP-IIME against different types of malware attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ahmed, S., Ali, A., Abbas, J., Hadi, L.: Intelligent intrusion detection in low-power IoTs. ACM Trans Internet Technol. 16(4), 1–25 (2016)

    Article  Google Scholar 

  2. Al-Turjman, F., Alturjman, S.: 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications. Multimed Tools Appl 79(13), 8627–8648 (2020)

    Article  Google Scholar 

  3. Alaparthy, V.T., Morgera, S.D.: A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6, 47364–47373 (2018)

    Article  Google Scholar 

  4. Alladi, T., Chamola, V., Sikdar, B., Choo, K.R.: Consumer IoT: security vulnerability case studies and solutions. IEEE Consumer Electron Mag 9(2), 17–25 (2020)

    Article  Google Scholar 

  5. Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput Commun 155, 1–8 (2020)

    Article  Google Scholar 

  6. Breitenbacher, D., Homoliak, I., Aung, Y.L., Tippenhauer, N.O., Elovici, Y.: HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. ACM Asia Conference on Computer and Communications Security. Asia CCS ’19, pp. 479–484. Auckland, New Zealand (2019)

  7. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3), 2671–2701 (2019)

    Article  Google Scholar 

  8. Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E., Yoo, K.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)

    Article  Google Scholar 

  9. Chen, M., Challita, U., Saad, W., Yin, C., Debbah, M.: Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE commun Surv Tutorials 21(4), 3039–3071 (2019)

    Article  Google Scholar 

  10. Cheng, Q., Varshney, P.K., Arora, M.K.: Logistic regression for feature selection and soft classification of remote sensing data. IEEE Geosci Rem Sens Lett 3(4), 491–494 (2006)

    Article  Google Scholar 

  11. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans Inf Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ethhack: What’s a botnet? When armies of contaminated IoT gadgets assault. Available at https://ethhack.com/2019/06/ what-is-a-botnet-when-armies-of- infected-iot-devices-attack-2/. Accessed on October 2019 (2019)

  13. Ganiz, M.C., George, C., Pottenger, W.M.: Higher order Nave Bayes: a novel non-IID approach to text classification. IEEE Trans Knowl Data Eng 23(7), 1022–1034 (2011)

    Article  Google Scholar 

  14. Han, X., Wang, L., Xu, S., Zhao, D., Liu, G.: Recognizing roles of online illegal gambling participants: an ensemble learning approach. Comput Secur 87(101), 588 (2019)

    Google Scholar 

  15. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)

    Article  Google Scholar 

  16. Ilascu, I.: New Echobot Botnet Variant Uses Over 50 Exploits to Propagate (2019). https://www.bleepingcomputer.com/news/ security/new-echobot-botnet-variant-uses-over-50-exploits-to-propagate/. Accessed October 2019

  17. Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7, 42450–42471 (2019)

    Article  Google Scholar 

  18. Jeon, G., Damiani, E., Anisetti, M.: Computational intelligence for multimedia and industrial applications. Multimed Tools Appl 76(23), 24589–24593 (2017)

    Article  Google Scholar 

  19. Jiang, L., Zhang, H., Cai, Z.: A Novel Bayes Model: hidden Naive Bayes. IEEE Trans Knowl Data Eng 21(10), 1361–1371 (2009)

    Article  Google Scholar 

  20. Kambourakis, G., Kolias, C., Stavrou, A.: The Mirai botnet and the IoT Zombie Armies. In: IEEE Military Communications Conference (MILCOM), pp. 267–272. Baltimore, USA (2017)

  21. Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., Kim, H.K.: IoT network intrusion dataset (2019). https://doi.org/10.21227/q70p-q449. Accessed January 2020

  22. Kelley, T., Furey, E.: Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control. In: 29th Irish Signals and Systems Conference (ISSC), pp. 1–6. Belfast, Ireland (2018)

  23. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and Other Botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  24. Korolov, M.: What is a botnet? When armies of infected IoT devices attack. https://www.csoonline.com/ article/3240364/ what-is-a-botnet.html. Accessed October 2019 (2019)

  25. Kumar, A., Lim, T.J.: EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. In: 5th World Forum on Internet of Things (WF-IoT), pp. 289–294. Limerick, Ireland (2019)

  26. Larose, D.T.: Logistic Regression. In: Data Mining Methods and Models, pp. 155–203 (2006). https://doi.org/10.1002/0471756482.ch4

  27. Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gen Comput Syst 96, 481–489 (2019)

    Article  Google Scholar 

  28. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5), 541–552 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  29. Mudgerikar, A., Sharma, P., Bertino, E.: E-spion: A system-level intrusion detection system for iot devices. ACM Asia Conference on Computer and Communications Security. Asia CCS ’19, pp. 493–500. Auckland, New Zealand (2019)

  30. Nandi, A.K., Ahmed, H.: Artificial Neural Networks (ANNs). In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 239–258. IEEE (2019). Doi:https://doi.org/10.1002/9781119544678.ch12

  31. Nandi, A.K., Ahmed, H.: Decision Trees and Random Forests. In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 199–224 (2019)

  32. Nowozin, S., Gehler, P.V., Jancsary, J., Lampert, C.H.: Training Structured Predictors Through Iterated Logistic Regression. In: Advanced Structured Prediction, pp. 213–238. MITP (2014). https://ieeexplore.ieee.org/document/7008219

  33. Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2), 314–323 (2019)

    Article  Google Scholar 

  34. Semic, H., Mrdovic, S.: IoT honeypot: A multi-component solution for handling manual and Mirai-based attacks. In: 25th Telecommunication Forum (TELFOR), pp. 1–4. Belgrade, Serbia (2017)

  35. Sharma, V., You, I., Yim, K., Chen, I., Cho, J.: Briot: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 556–580 (2019)

    Article  Google Scholar 

  36. Sinanovi, H., Mrdovic, S.: Analysis of Mirai malicious software. 25th International Conference on Software. Telecommunications and Computer Networks (SoftCOM), pp. 1–5. Split, Croatia (2017)

  37. Singh, A., Mahapatra, S.: Network-Based Applications of Multimedia Big Data Computing in IoT Environment. In: S. Tanwar, S. Tyagi, N. Kumar (eds.) Multimedia Big Data Computing for IoT Applications, chap. 17, pp. 435–452. Springer, Singapore (2020)

  38. Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J 18(5), 1971–1984 (2018)

    Article  Google Scholar 

  39. Tickle, A.B., Andrews, R., Golea, M., Diederich, J.: The truth will come to light: directions and challenges in extracting the knowledge embedded within trained artificial neural networks. IEEE Trans Neural Netw 9(6), 1057–1068 (1998)

    Article  Google Scholar 

  40. Verma, G.K., Singh, B.B., Kumar, N., Chamola, V.: CB-CAS: certificate-based efficient signature scheme with compact aggregation for industrial Internet of Things environment. IEEE Internet Things J 7(4), 2563–2572 (2020)

    Article  Google Scholar 

  41. Wang, S.S., Yan, K.Q., Wang, S.C., Liu, C.W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Expert Syst Appl 38(12), 15234–15243 (2011)

    Article  Google Scholar 

  42. Wang, Y., Fu, W., Agrawal, D.P.: Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2), 342–355 (2013)

    Article  Google Scholar 

  43. Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mobile Comput 7(6), 698–711 (2008)

    Article  Google Scholar 

  44. Wazid, M., Das, A.K.: An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks. Wirel Pers Commun 90(4), 1971–2000 (2016)

    Article  Google Scholar 

  45. Wazid, M., Das, A.K.: A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3), 1165–1191 (2017)

    Article  Google Scholar 

  46. Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur Commun Netw 9(17), 4596–4614 (2016)

    Article  Google Scholar 

  47. Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput (2017). https://doi.org/10.1109/TDSC.2017.2764083

    Article  Google Scholar 

  48. Wazid, M., Das, A.K., Rodrigues, J.J.P.C., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 459–476 (2019)

    Article  Google Scholar 

  49. Wazid, M., Das, A.K., Shetty, S., Rodrigues, J., Park, Y.: LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24), 5539 (2019)

    Article  Google Scholar 

  50. Wazid, M., Reshma Dsouza, P., Das, A.K., Bhat, K. V., Kumar, N., Rodrigues, J.J.P.C.: RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. International Journal of Communication Systems 32(15), e4024 (2019)

  51. Wlas, M., Krzeminski, Z., Guzinski, J., Abu-Rub, H., Toliyat, H.A.: Artificial-neural-network-based sensorless nonlinear control of induction motors. IEEE Trans Energy Convers 20(3), 520–528 (2005)

    Article  Google Scholar 

  52. Zhao, L., Dong, X.: An industrial internet of things feature selection method based on potential entropy evaluation criteria. IEEE Access 6, 4608–4617 (2018)

    Article  Google Scholar 

  53. Zhao, Y., Li, Y., Zhang, X., Geng, G., Zhang, W., Sun, Y.: A survey of networking applications applying the software defined networking concept based on machine learning. IEEE Access 7, 95397–95417 (2019)

    Article  Google Scholar 

  54. Zikria, Y.B., Afzal, M.K., Kim, S.W.: Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. Sensors 20(8) (2020). https://www.mdpi.com/1424-8220/20/8/2334

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers and the Editor for their valuable feedback. This work is supported in part by PR of China Ministry of Education Distinguished Possessor Grant given to Prof. Obaidat under number: MS2017BJKJ003. This work was also partially supported in part by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/50008/2020; and in part by Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joel J. P. C. Rodrigues.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pundir, S., Obaidat, M.S., Wazid, M. et al. MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach. Multimedia Systems 29, 1785–1797 (2023). https://doi.org/10.1007/s00530-020-00743-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-020-00743-9

Keywords

Navigation