Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification

被引:4
作者
Danso, Priscilla Kyei [1 ]
Dadkhah, Sajjad [1 ]
Neto, Euclides Carlos Pinto
Zohourian, Alireza [1 ]
Molyneaux, Heather [2 ]
Lu, Rongxing [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Canadian Inst Cybersecur, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[2] Digital Technol Res Ctr, Natl Res Council, Cybersecur Team, Fredericton, NB E3B 9W4, Canada
关键词
Internet of Things (IoT); machine learning (ML); security; transferability; visualization; vulnerability assessment;
D O I
10.1109/JIOT.2023.3292319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of appropriate cyber security measures deployed on Internet of Things (IoT) makes these devices prone to security issues. Consequently, the timely identification and detection of these compromised devices become crucial. Machine learning (ML) models which are used to monitor devices in a network have made tremendous strides. However, most of the research in profiling and identification uses the same data for training and testing. Hence, a slight change in the data renders most learning algorithms to work poorly. In this article, we study a transferability approach based on the concept of transductive transfer learning for IoT device profiling and identification. Notably, this type of transfer learning works by explicitly assigning labels to the test data in the target domain by using the test feature space in the target domain, with training data from the source domain. Specifically, we propose a three-component system comprising: 1) the device type identification; 2) the vulnerability assessment; and 3) the visualization module. The device type identification component uses the underlying concept of transductive transfer learning where the trained model is transferred to a remote lab for testing. A variety of ML models are evaluated with respect to accuracy, precision, recall, and F1-score in order to determine which are the most suitable for the proposed transferability profiling. Furthermore, the vulnerability of the predicted device type is also assessed by using three vulnerability databases: 1) Vulners; 2) National Vulnerability Database (NVD); and 3) IBM X-Force. Finally, the results from the vulnerability assessment are visualized and displayed on a dashboard.
引用
收藏
页码:2322 / 2335
页数:14
相关论文
共 41 条
  • [1] Almomani A. M., 2022, Int. J. Contemp. Manage. Inf. Technol., V2, P15
  • [2] IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
    Anand, Pooja
    Singh, Yashwant
    Selwal, Arvind
    Alazab, Mamoun
    Tanwar, Sudeep
    Kumar, Neeraj
    [J]. IEEE ACCESS, 2020, 8 (168825-168853): : 168825 - 168853
  • [3] [Anonymous], 2020, INTERNET THINGS IOT
  • [4] [Anonymous], 2016, Internet of Things - IoT: Definition, Characteristics, Architecture, Enabling Technologies, Application Future Challenges
  • [5] Anwar A, 2020, Arxiv, DOI arXiv:2006.15074
  • [6] On testing machine learning programs
    Ben Braiek, Houssem
    Khomh, Foutse
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 164
  • [7] Booth Harold, 2013, NATL VULNERABILITY D
  • [8] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [9] A survey on feature selection methods
    Chandrashekar, Girish
    Sahin, Ferat
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 16 - 28
  • [10] Du R., 2022, Security Commun. Netw.