Accurate threat hunting in industrial internet of things edge devices

被引:0
|
作者
Abbas Yazdinejad [1 ]
Behrouz Zolfaghari [1 ]
Ali Dehghantanha [1 ]
Hadis Karimipour [2 ]
Gautam Srivastava [3 ,4 ,5 ]
Reza MParizi [6 ]
机构
[1] Cyber Science Lab, School of Computer Science, University of Guelph
[2] Department of Electrical and Software Engineering, University of Calgary
[3] Department of Mathematics and Computer Science, Brandon University
[4] Research Center for Interneural Computing, China Medical University
[5] Department of Computer Science and Mathematics, Lebanese American University
[6] College of Computing and Software Engineering, Kennesaw State
关键词
D O I
暂无
中图分类号
TN929.5 [移动通信]; TP393 [计算机网络];
学科分类号
081201 ; 1201 ;
摘要
Industrial Internet of Things(IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection, transmission, storage, and processing. Any kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire IIoT. Moreover, they can allow malicious software installed on end nodes to penetrate the network. This paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge devices. The proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority voting. Experimental evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy, F1 score, recall, and precision.
引用
收藏
页码:1123 / 1130
页数:8
相关论文
共 50 条
  • [21] Threat Hunting Architecture for Electric Internet of Things: Redundancy, Diversity, Dynamism and Machine Learning
    Zhan, Congcong
    Xie, Shanyi
    Kang, Yilin
    Li, Yan
    Nong, Caiyan
    Hu, Xianjun
    2024 THE 9TH INTERNATIONAL CONFERENCE ON POWER AND RENEWABLE ENERGY, ICPRE, 2024, : 1463 - 1468
  • [22] A threat recognition solution of edge data security in industrial internet
    Qianmu Li
    Huaqiu Long
    Zhuoran Xu
    Jun Hou
    Junhui Cai
    World Wide Web, 2022, 25 : 2109 - 2138
  • [23] A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
    HaddadPajouh, Hamed
    Dehghantanha, Ali
    Khayami, Raouf
    Choo, Kim-Kwang Raymond
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 85 : 88 - 96
  • [24] A threat recognition solution of edge data security in industrial internet
    Li, Qianmu
    Long, Huaqiu
    Xu, Zhuoran
    Hou, Jun
    Cai, Junhui
    World Wide Web, 2022, 25 (05) : 2109 - 2138
  • [25] A threat recognition solution of edge data security in industrial internet
    Li, Qianmu
    Long, Huaqiu
    Xu, Zhuoran
    Hou, Jun
    Cai, Junhui
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2022, 25 (05): : 2109 - 2138
  • [26] Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment
    Alruwaili, Fahad F.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5809 - 5824
  • [27] Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing
    Aleksandrova, E. B.
    Oblogina, A. Yu
    Shkorkina, E. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1087 - 1091
  • [28] Assignment of IoT Nodes to Edge Computing Devices in Internet of Things
    Perkin, T. Madhu
    Mini, S.
    2019 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2019, : 528 - 532
  • [29] IOTBENCH: A BENCHMARK SUITE FOR INTELLIGENT INTERNET OF THINGS EDGE DEVICES
    Lee, Chien-I
    Lin, Meng-Yao
    Yang, Chia-Lin
    Chen, Yen-Kuang
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 170 - 174
  • [30] Accuracy-Resource Tradeoff for Edge Devices in Internet of Things
    Mousavi, Nima
    Aksanli, Baris
    Akyurek, Alper Sinan
    Rosing, Tajana Simunic
    2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2017,