RTCS: An Improved Real-Time Credibility-Based Intrusion Detection System

被引:0
作者
Zhang, Chen [1 ]
Lian, Zhuotao [2 ]
Huang, Huakun [3 ]
Su, Chunhua [1 ]
机构
[1] Univ Aizu, Dept Comp Sci & Engn, Aizu Wakamatsu 9650006, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
[3] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Security; Authentication; Real-time systems; Protocols; Encryption; Cryptography; Servers; Machine learning algorithms; Hash functions; Credibility; Internet of Things (IoT); machine learning; permission; protocol; real-time credibility system (RTCS);
D O I
10.1109/JIOT.2024.3514656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) connects physical devices to the Internet via open communication protocols. Malicious actors can exploit vulnerabilities to steal data or manipulate critical IoT settings, so there is a need for strong security measures. We propose an improved real-time intrusion detection system (IDS) called the real-time credibility system (RTCS), which utilizes traffic statistics and authentication analysis to compute credibility. RTCS performs the authentication process by utilizing elliptic curve encryption and decryption operations, basic symmetric encryption, and hash functions. This process enables anonymous mutual authentication between IoT devices. Subsequently, RTCS accesses sparsified user history data and introduces flexibility in calculating user credibility by employing an adapted secondary paradigm combined with preset "tolerance parameters," which serve as optimal thresholds for classifying different users. When a normal user violates regulations, their credibility decreases by a specified degree. If a high-risk user commits another violation, RTCS cannot tolerate it, leading to a rapid decline in their credibility. RTCS implements diversion measures and provides assisted decision scores for different users. Experimental results demonstrate that our method achieves an F1-score of 0.9707 and an area under the curve score of 0.9535. Compared to other works, RTCS exhibits superior performance and proactivity.
引用
收藏
页码:10948 / 10957
页数:10
相关论文
共 31 条
[1]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[2]   FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications [J].
Barradas, Diogo ;
Santos, Nuno ;
Rodrigues, Luis ;
Signorello, Salvatore ;
Ramos, Fernando M., V ;
Madeira, Andre .
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
[3]   A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems [J].
Chettri, Lalit ;
Bera, Rabindranath .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) :16-32
[4]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[5]   A machine learning-based credit risk prediction engine system using a stacked classifier and a filter-based feature selection method [J].
Emmanuel, Ileberi ;
Sun, Yanxia ;
Wang, Zenghui .
JOURNAL OF BIG DATA, 2024, 11 (01)
[6]  
Fu C., 2023, P S NDSS, P1
[7]   Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis [J].
Fu, Chuanpu ;
Li, Qi ;
Shen, Meng ;
Xu, Ke .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :3431-3446
[8]   A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT [J].
He, Daojing ;
Cai, Yanchang ;
Zhu, Shanshan ;
Zhao, Ziming ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) :7862-7872
[9]   TSHNN: Temporal-Spatial Hybrid Neural Network for Cognitive Wireless Human Activity Recognition [J].
Huang, Huakun ;
Lin, Liang ;
Zhao, Lingjun ;
Huang, Huawei ;
Ding, Shuxue .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2024, 10 (06) :2088-2101
[10]   An explainable deep learning-enabled intrusion detection framework in IoT networks [J].
Keshk, Marwa ;
Koroniotis, Nickolaos ;
Pham, Nam ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Zomaya, Albert Y. .
INFORMATION SCIENCES, 2023, 639