An intelligent context-aware threat detection and response model for smart cyber-physical systems

被引:12
作者
Noor, Zainab [1 ]
Hina, Sadaf [2 ]
Hayat, Faisal [1 ]
Shah, Ghalib A. [3 ]
机构
[1] Univ Engn & Technol, Dept Comp Engn, Lahore, Pakistan
[2] Univ Salford, Sch Sci Engn & Environm, Dept Comp Sci, Manchester, England
[3] Air Univ, Dept Mechatron, Islamabad, Pakistan
关键词
Smart homes; Cyber-physical systems; Context -aware IoT security; Network traffic analysis; Machine learning; INTRUSION DETECTION;
D O I
10.1016/j.iot.2023.100843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently, especially in smart homes. These gadgets can expose users to serious cyber dangers because of a variety of computing constraints and vulnerabilities in the security-by-design concept. The smart home network testbed setup presented in this study is used to evaluate and validate the protection of the smart cyber-physical system. The context-aware threat intelligence and response model identifies the states of the aligned smart devices to distinguish between real-world typical and attack scenarios. It then dynamically writes specific rules for protection against potential cyber threats. The context-aware model is trained on IoT Research and Innovation Lab - Smart Home System (IRIL-SHS) testbed dataset. The labeled dataset is utilized to create a random forest model, which is subsequently used to train and test the context-aware threat intelligence SHS model's effectiveness and performance. Finally, the model's logic is used to gain rules to be included in Suricata signatures and the firewall rulesets for the response system. Significant values of the measuring parameters were found in the results. The presented model can be used for the real-time security of smart home cyber-physical systems and develops a vision of security challenges for Industry 4.0.
引用
收藏
页数:20
相关论文
共 78 条
[1]  
Abdullah R.S., 2022, LEARNING TECHNIQUE, V4, P18
[2]   Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set [J].
Ahmad, Muhammad ;
Riaz, Qaiser ;
Zeeshan, Muhammad ;
Tahir, Hasan ;
Haider, Syed Ali ;
Khan, Muhammad Safeer .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[3]   Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning-A Review [J].
Ahsan, Mostofa ;
Nygard, Kendall E. ;
Gomes, Rahul ;
Chowdhury, Md Minhaz ;
Rifat, Nafiz ;
Connolly, Jayden F. .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2022, 2 (03) :527-555
[4]   A lightweight cyber security framework with context-awareness for pervasive computing environments [J].
Al-Muhtadi, Jalal ;
Saleem, Kashif ;
Al-Rabiaah, Sumayah ;
Imran, Muhammad ;
Gawanmeh, Amjad ;
Rodrigues, Joel J. P. C. .
SUSTAINABLE CITIES AND SOCIETY, 2021, 66
[5]  
[Anonymous], HOIC TOOL
[6]  
[Anonymous], 2002, ABOUT US
[7]   Intelligent cyber-phishing detection for online [J].
Barraclough, P. A. ;
Fehringer, G. ;
Woodward, J. .
COMPUTERS & SECURITY, 2021, 104
[8]  
Basharat A., 2022, MACHINE LEARNING TEC
[9]   Traffic Analysis Based on Bluetooth Passive Scanning [J].
Boudabous, Safa ;
Garbiso, Julian ;
Leroy, Bertrand ;
Clemencon, Stephan ;
Labiod, Houda .
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
[10]   Extremely Randomized Trees-Based Scheme for Stealthy Cyber-Attack Detection in Smart Grid Networks [J].
Camana, Mario R. ;
Ahmed, Saeed ;
Garcia, Carla E. ;
Koo, Insoo .
IEEE ACCESS, 2020, 8 :19921-19933