Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3492324.3494170acmconferencesArticle/Chapter ViewAbstractPublication PagesbdcatConference Proceedingsconference-collections
short-paper

Verification Based Scheme to Restrict IoT Attacks

Published: 13 January 2022 Publication History

Abstract

In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier’s categorization of a given record while ignoring its confidence. This paper proposes a verification-based scheme to reject IoT attacks by utilizing the classifier’s confidence. At the same time, existing studies are evaluated using traditional cross-validation approaches (e.g., k-fold), thus, not tested against unknown attacks. We propose using the leave-one-attack-out (LOAO) cross-validation scheme to evaluate the generalizability of the application to unknown attacks. The experiments are performed on Med BIoT, a publicly available dataset consisting of three IoT attacks. The system’s robustness is evaluated in terms of Receiver Operating Curves (ROC) and Equal Error rates (EERs). The results indicate a lower false-positive rate of 12.6% using the proposed verification-based approach in comparison to k-fold cross-validation.

References

[1]
Malek Al-Zewairi, Sufyan Almajali, and Moussa Ayyash. 2020. Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers. Electronics 9, 12 (2020), 2006.
[2]
Jadel Alsamiri and Khalid Alsubhi. 2019. Internet of Things cyber attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl 10, 12 (2019), 627–634.
[3]
Mohamed Ahzam Amanullah, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Nasaruddin, Abdullah Gani, Ejaz Ahmed, Abdul Salam Mohamed Nainar, Nazihah Md Akim, and Muhammad Imran. 2020. Deep learning and big data technologies for IoT security. Computer Communications 151 (2020), 495–517.
[4]
Eirini Anthi, Lowri Williams, Małgorzata Słowińska, George Theodorakopoulos, and Pete Burnap. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal 6, 5 (2019), 9042–9053.
[5]
Ioana Apostol, Marius Preda, Constantin Nila, and Ion Bica. 2021. IoT Botnet Anomaly Detection Using Unsupervised Deep Learning. Electronics 10, 16 (2021), 1876.
[6]
Rana Aamir Raza Ashfaq, Xi-Zhao Wang, Joshua Zhexue Huang, Haider Abbas, and Yu-Lin He. 2017. Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences 378(2017), 484–497.
[7]
Hayretdin Bahşi, Sven Nõmm, and Fabio Benedetto La Torre. 2018. Dimensionality reduction for machine learning based iot botnet detection. In 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 1857–1862.
[8]
João Marcelo Ceron, Klaus Steding-Jessen, Cristine Hoepers, Lisandro Zambenedetti Granville, and Cíntia Borges Margi. 2019. Improving iot botnet investigation using an adaptive network layer. Sensors 19, 3 (2019), 727.
[9]
Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2019. Newest collaborative and hybrid network intrusion detection framework based on suricata and isolation forest algorithm. In Proceedings of the 4th International Conference on Smart City Applications. 1–11.
[10]
Peter Clay. 2015. A modern threat response framework. Network Security 2015, 4 (2015), 5–10.
[11]
Juliette Dromard, Gilles Roudière, and Philippe Owezarski. 2016. Online and scalable unsupervised network anomaly detection method. IEEE Transactions on Network and Service Management 14, 1(2016), 34–47.
[12]
Mojtaba Eskandari, Zaffar Haider Janjua, Massimo Vecchio, and Fabio Antonelli. 2020. Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal 7, 8 (2020), 6882–6897.
[13]
Sannasi Ganapathy, Kanagasabai Kulothungan, Sannasy Muthurajkumar, Muthusamy Vijayalakshmi, Palanichamy Yogesh, and Arputharaj Kannan. 2013. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP Journal on Wireless Communications and Networking 2013, 1(2013), 1–16.
[14]
Sannasi Ganapathy, P Yogesh, and Arputharaj Kannan. 2012. Intelligent agent-based intrusion detection system using enhanced multiclass SVM. Computational intelligence and neuroscience 2012 (2012).
[15]
Iman Ghosh. 2021. AIoT: When AI meets the Internet of Things. https://www.weforum.org/agenda/2021/03/ai-is-fusing-with-the-internet-of-things-to-create-new-technology-innovations/
[16]
Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, and Sven Nõmm. 2020. MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. In ICISSP. 207–218.
[17]
Mahmudul Hasan, Md Milon Islam, Md Ishrak Islam Zarif, and MMA Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7(2019), 100059.
[18]
Katherine Heller, Krysta Svore, Angelos D Keromytis, and Salvatore Stolfo. 2003. One class support vector machines for detecting anomalous windows registry accesses. (2003).
[19]
Olumuyiwa Ibidunmoye, Ali-Reza Rezaie, and Erik Elmroth. 2017. Adaptive anomaly detection in performance metric streams. IEEE Transactions on Network and Service Management 15, 1(2017), 217–231.
[20]
Christiana Ioannou and Vasos Vassiliou. 2019. Classifying security attacks in IoT networks using supervised learning. In 2019 15th International conference on distributed computing in sensor systems (DCOSS). IEEE, 652–658.
[21]
Sheharbano Khattak, Naurin Rasheed Ramay, Kamran Riaz Khan, Affan A Syed, and Syed Ali Khayam. 2013. A taxonomy of botnet behavior, detection, and defense. IEEE communications surveys & tutorials 16, 2 (2013), 898–924.
[22]
Jihyun Kim, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim. 2016. Long short term memory recurrent neural network classifier for intrusion detection. In 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 1–5.
[23]
Jin Kim, Nara Shin, Seung Yeon Jo, and Sang Hyun Kim. 2017. Method of intrusion detection using deep neural network. In 2017 IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE, 313–316.
[24]
Pradeep Kumar, Rajkumar Saini, Partha Pratim Roy, and Debi Prosad Dogra. 2017. A bio-signal based framework to secure mobile devices. Journal of Network and Computer Applications 89 (2017), 62–71.
[25]
Jingzhen Li, Yuhang Liu, Zedong Nie, Wenjian Qin, Zengyao Pang, and Lei Wang. 2017. An approach to biometric verification based on human body communication in wearable devices. Sensors 17, 1 (2017), 125.
[26]
Antonio Gonzalez Pastana Lobato, Martin Andreoni Lopez, Igor Jochem Sanz, Alvaro A Cardenas, Otto Carlos MB Duarte, and Guy Pujolle. 2018. An adaptive real-time architecture for zero-day threat detection. In 2018 IEEE international conference on communications (ICC). IEEE, 1–6.
[27]
McKinsey. 2017. What’s new with the inter-net of things. https://www.mckinsey.com/industries/semiconductors/our-insights/whats-new-with-the-internet-of-thingsl
[28]
Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, and Yuval Elovici. 2018. N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing 17, 3 (2018), 12–22.
[29]
Sven Nõmm and Hayretdin Bahşi. 2018. Unsupervised anomaly based botnet detection in IoT networks. In 2018 17th IEEE international conference on machine learning and applications (ICMLA). IEEE, 1048–1053.
[30]
T Saranya, S Sridevi, C Deisy, Tran Duc Chung, and MKA Ahamed Khan. 2020. Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science 171 (2020), 1251–1260.
[31]
Bambang Susilo and Riri Fitri Sari. 2020. Intrusion detection in IoT networks using deep learning algorithm. Information 11, 5 (2020), 279.
[32]
Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli. 2020. Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication 4, 4(2020), 482–503.
[33]
Bayu Adhi Tama and Kyung-Hyune Rhee. 2017. Attack classification analysis of IoT network via deep learning approach. Res. Briefs Inf. Commun. Technol. Evol.(ReBICTE) 3 (2017), 1–9.
[34]
Ly Vu, Quang Uy Nguyen, Diep N Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz, 2019. Learning latent distribution for distinguishing network traffic in intrusion detection system. In ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 1–6.
[35]
Jie Wang, Lili Yang, Jie Wu, and Jemal H Abawajy. 2017. Clustering analysis for malicious network traffic. In 2017 IEEE International Conference on Communications (ICC). IEEE, 1–6.
[36]
Tian Wang, Md Zakirul Alam Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, and Thaier Hayajneh. 2019. Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet of Things Journal 7, 4 (2019), 2679–2689.
[37]
JingTao Yao, Songlun Zhao, and Lisa Fan. 2006. An enhanced support vector machine model for intrusion detection. In International Conference on Rough Sets and Knowledge Technology. Springer, 538–543.
[38]
Congyingzi Zhang and Robert Green. 2015. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th Symposium on Communications & Networking. 8–15.
[39]
Zhun Zhang, Qihe Liu, Shilin Qiu, Shijie Zhou, and Cheng Zhang. 2020. Unknown attack detection based on zero-shot learning. IEEE Access 8(2020), 193981–193991.

Cited By

View all
  • (2023)CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT EnvironmentSensors10.3390/s2313594123:13(5941)Online publication date: 26-Jun-2023
  • (2022)Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning2022 19th Annual International Conference on Privacy, Security & Trust (PST)10.1109/PST55820.2022.9851984(1-10)Online publication date: 22-Aug-2022

Index Terms

  1. Verification Based Scheme to Restrict IoT Attacks
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      BDCAT '21: Proceedings of the 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies
      December 2021
      133 pages
      ISBN:9781450391641
      DOI:10.1145/3492324
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 January 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IoT
      2. ROC.
      3. cyber security
      4. intrusion detection
      5. machine learning
      6. unkown attacks

      Qualifiers

      • Short-paper
      • Research
      • Refereed limited

      Conference

      BDCAT '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 27 of 93 submissions, 29%

      Upcoming Conference

      BDCAT '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)17
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT EnvironmentSensors10.3390/s2313594123:13(5941)Online publication date: 26-Jun-2023
      • (2022)Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning2022 19th Annual International Conference on Privacy, Security & Trust (PST)10.1109/PST55820.2022.9851984(1-10)Online publication date: 22-Aug-2022

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media