A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT

被引:15
作者
Deng, Xiaoheng [1 ,2 ]
Chen, Bin [1 ,2 ]
Chen, Xuechen [1 ,2 ]
Pei, Xinjun [1 ,2 ]
Wan, Shaohua [3 ]
Goudos, Sotirios K. [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Cent South Univ, Shenzhen Res Inst, Changsha 410083, Peoples R China
[3] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
[4] Aristotle Univ Thessaloniki, ELEDIA AUTH, Sch Phys, Thessaloniki 54124, Greece
基金
中国国家自然科学基金;
关键词
Edge computing; Internet of Things(IoT); pre-identification database; preidentification mechanism; risk detection engine;
D O I
10.1109/TII.2023.3245681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) mainly consists of a large number of Internet-connected devices. The proliferation of untrusted third-party IoT applications has led to an increase in IoT-based malware attacks. In addition, it is infeasible for the IoT devices to support the sophisticated detection systems due to the restricted resources. Edge computing is considered to be promising. It provides solutions to the data security and privacy leakage brought by untrusted third-party IoT applications. In this article, an intelligent trusted and secure edge computing(ITEC) system is proposed for IoT malware detection. In this system, a signature-based preidentification mechanism is built for matching and identifying the malicious behaviors of untrusted third-party IoT applications. A delay strategy is then embedded into the risk detection engine in order to "buy time" for threat analysis, and rate-limit the impact of suspicious third-party IoT applications in the system. We conduct extensive experiments to verify the effectiveness of the ITEC system and show that we can achieve accuracies of up to 98.52%.
引用
收藏
页码:1445 / 1454
页数:10
相关论文
共 32 条
  • [1] Abbas MFB., 2017, APPL TECHNIQUES INFO, V8, P181, DOI DOI 10.1007/978-981-10-5421-1_15
  • [2] Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain
    Alshahrani, Hani Mohammed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 739 - 766
  • [3] Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01): : 88 - 95
  • [4] Online Malware Classification with System-Wide System Calls in Cloud IaaS
    Brown, Phillip
    Brown, Austin
    Gupta, Maanak
    Abdelsalam, Mahmoud
    [J]. 2022 IEEE 23RD INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2022), 2022, : 146 - 151
  • [5] Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures
    Cui, Lei
    Qu, Youyang
    Xie, Gang
    Zeng, Deze
    Li, Ruidong
    Shen, Shigen
    Yu, Shui
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3492 - 3500
  • [6] DIALLO AF, 2021, 40 IEEE C COMPUTER C, P1
  • [7] Fuzzy pattern tree for edge malware detection and categorization in IoT
    Dovom, Ensieh Modiri
    Azmoodeh, Amin
    Dehghantanha, Ali
    Newton, David Ellis
    Parizi, Reza M.
    Karimipour, Hadis
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 : 1 - 7
  • [8] A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
    Feng, Ruitao
    Chen, Sen
    Xie, Xiaofei
    Meng, Guozhu
    Lin, Shang-Wei
    Liu, Yang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1563 - 1578
  • [9] An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit
    Feng, Zhiwei
    Guan, Nan
    Lv, Mingsong
    Liu, Weichen
    Deng, Qingxu
    Liu, Xue
    Yi, Wang
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 17 (06)
  • [10] Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System
    Guo, Shaoyong
    Hu, Xing
    Guo, Song
    Qiu, Xuesong
    Qi, Feng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1972 - 1983