An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments

被引:0
|
作者
Niu, Tong [1 ]
Liu, Yaqiu [1 ]
Li, Qingfeng [2 ]
Bao, Qichi [1 ]
机构
[1] Northeast Forestry Univ, State Coll Comp & Control Engn, Harbin 150000, Peoples R China
[2] Northeast Forestry Univ, Network Informat Ctr, Harbin 150000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Data models; Computational modeling; Servers; Accuracy; Training; Image edge detection; Feature extraction; Data privacy; Telecommunication traffic; Blockchains; Blockchain; malicious traffic detection; Docker; INTERNET;
D O I
10.1109/ACCESS.2024.3481496
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to evolve, its inherent diversity and rapid iteration pose challenges for the development and deployment of malicious traffic detection systems. This study aims to develop a scalable detection architecture that can accurately identify malicious traffic in IoT environments, while protecting user privacy. We propose a deep-learning-based model that is capable of training and updating within an IoT setting. The payload of the data packets is encoded to enhance the feature extraction capability of the model. The model is then trained using federated learning/edge computing to ensure data privacy. The final model parameters are stored in an IPFS file storage system with the corresponding hash value stored in the blockchain, ensuring the correctness of the model parameters during expansion. Experiments were conducted in a Docker environment using the CIC IoT Dataset 2022 and CIC IoT Dataset 2023. The results demonstrate that the proposed architecture achieves a pre-training accuracy of 98.6% for known abnormal traffic and 79% for unknown malicious traffic. After a few rounds of training, the accuracies improved to 99.5% and 89.4%. The model also exhibited robust performance during expansion.
引用
收藏
页码:191010 / 191019
页数:10
相关论文
共 50 条
  • [31] Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach
    Pranto, Tahmid Hasan
    Hasib, Kazi Tamzid Akhter Md
    Rahman, Tahsinur
    Haque, Akm Bahalul
    Islam, A. K. M. Najmul
    Rahman, Rashedur M.
    IEEE ACCESS, 2022, 10 : 87115 - 87134
  • [32] Blockchain-Enhanced Zero Knowledge Proof-Based Privacy-Preserving Mutual Authentication for IoT Networks
    Pathak, Aditya
    Al-Anbagi, Irfan
    Hamilton, Howard J.
    IEEE ACCESS, 2024, 12 : 118618 - 118636
  • [33] Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic Analysis
    Zang, Mingy uan
    Zheng, Changgang
    Koziak, Tomasz
    Zilberman, Noa
    Dittmann, Lars
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2024, 24 (04)
  • [34] PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts
    Le, Tam
    Mutka, Matt W.
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 172 - 179
  • [35] BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT
    Goyat, Rekha
    Kumar, Gulshan
    Conti, Mauro
    Devgun, Tannishtha
    Saha, Rahul
    Thomas, Reji
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16480 - 16493
  • [36] Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture
    Stodt, Fatemeh
    Kamel, Mohammed B. M.
    Reich, Christoph
    Theoleyre, Fabrice
    Ligeti, Peter
    IEEE ACCESS, 2024, 12 : 26747 - 26758
  • [37] A Blockchain-Based Privacy-Preserving and Fair Data Transaction Model in IoT
    Zhou, Wei
    Zhang, De
    Han, Guangjie
    Zhu, Wenyin
    Wang, Xupeng
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [38] Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT
    Huang, Cheng
    Liu, Dongxiao
    Ni, Jianbing
    Lu, Rongxing
    Shen, Xuemin
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [39] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [40] A privacy-preserving botnet detection approach in largescale cooperative IoT environment
    Li, Yixin
    Zhu, Muyijie
    Luo, Xi
    Yin, Lihua
    Fu, Ye
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (19) : 13725 - 13737