On-device context-aware misuse detection framework for heterogeneous IoT edge

被引:5
作者
Nitish, A. [1 ]
Hanumanthappa, J. [1 ]
Prakash, Shiva S. P. [2 ]
Krinkin, Kirill [3 ]
机构
[1] Univ Mysore, Dept Studies Comp Sci, Mysuru 570006, Karnataka, India
[2] JSS Sci & Technol Univ, Dept Informat Sci & Engn, JSS Tech Inst Campus, Mysuru 570006, Karnataka, India
[3] St Petersburg Electrotech Univ LETI, Dept Software Engn & Comp Applicat, Ulitsa Prof Popova 5, St Petersburg 197022, Russia
关键词
Botnet-based attacks; Context-awareness; Expert knowledge correlation; Heterogeneous IoT edge; On-device misuse intrusion detection; Root cause analysis; Threat intensity compounding; Threat localization; INTRUSION DETECTION; INTERNET; THINGS; ATTACKS; SYSTEM;
D O I
10.1007/s10489-022-04039-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional AI techniques for offline misuse network intrusion detection have performed well, assuming that the traffic from the datasets is sufficiently large for generalization, balanced, independently and identically distributed-exhibiting homogeneous behavior with little to no context change. However, the rapidly expanding IoT network is an ensemble of proliferating internet-connected devices catering to the growing need for handling highly distributed, heterogeneous, and time-critical workloads that conform to none of the above assumptions. Moreover, the evolving Botnet-based attack vectors exploit the non-standardized and poorly scrutinized architectural vulnerabilities of such devices-leading to compounding threat intensity, rapidly rendering the network defenseless. Furthermore, the memory, processor, and energy resource constraints of the IoT devices necessitate lightweight device-specific intrusion detection policies for effective and updated rule learning in real-time through the edge infrastructures. However, the existing methods proposed to solve such issues are either centralized, data and resource-intensive, context-unaware, or inefficient for online rule learning with smaller and imbalanced data samples. Thus, this paper addresses such issues through a context-aware expert system-based feature subset framework with minimal processing overhead and a decentralized on-device misuse detection scheme for IoT-called HetIoT-NIDS, capable of efficiently inferring over smaller data samples, tolerant to class imbalance, and deployable on the low-memory and low-power edge of IoT devices. Furthermore, HetIoT-NIDS facilitates threat localization within the deployed device, preventing threat progression and intensity compounding. The experiments and analyses of the propounded algorithms and the resulting training times and model sizes prove that the proposed approach is efficient and adaptable to online and offline misuse intrusion detection, especially on smaller data sample sizes.
引用
收藏
页码:14792 / 14818
页数:27
相关论文
共 50 条
[41]   Context-Aware Service Discovery: Graph Techniques for IoT Network Learning and Socially Connected Objects [J].
Hamrouni, Aymen ;
Khanfor, Abdullah ;
Ghazzai, Hakim ;
Massoud, Yehia .
IEEE ACCESS, 2022, 10 :107330-107345
[42]   Software Framework of Context-Aware Reconfigurable Secure Smart Grids [J].
Fkaier, Soumoud ;
Khalgui, Mohamed ;
Frey, Georg .
SOFTWARE TECHNOLOGIES, ICSOFT 2021, 2022, 1622 :193-217
[43]   CTMF: Context-Aware Trust Management Framework for Internet of Vehicles [J].
Rehman, Abdul ;
Hassan, Mohd Fadzil ;
Hooi, Yew Kwang ;
Qureshi, Muhammad Aasim ;
Shukla, Saurabh ;
Susanto, Erwin ;
Rubab, Saddaf ;
Abdel-Aty, Abdel-Haleem .
IEEE ACCESS, 2022, 10 :73685-73701
[44]   AEGIS: A Context-aware Security Framework for Smart Home Systems [J].
Sikder, Amit Kumar ;
Babun, Leonardo ;
Aksu, Hidayet ;
Uluagac, A. Selcuk .
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, :28-41
[45]   Framework for designing context-aware learning systems [J].
Tortorella, Richard A. W. ;
Dr Kinshuk ;
Chen, Nian-Shing .
EDUCATION AND INFORMATION TECHNOLOGIES, 2018, 23 (01) :143-164
[46]   An adaptive middleware framework for context-aware applications [J].
Markus C. Huebscher ;
Julie A. McCann .
Personal and Ubiquitous Computing, 2006, 10 :12-20
[47]   A context-aware and intelligent framework for the secure mission critical systems [J].
Sikandar, Usman ;
Taha, Muhammad ;
Sarwar, Sohail ;
Safyan, M. ;
Ul Qayyum, Zia ;
Ali, Amjad ;
Iqbal, Muddesar .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)
[48]   A Context-Aware Framework for Business Processes Evolution [J].
Bucchiarone, Antonio ;
Marconi, Annapaola ;
Pistore, Marco ;
Sirbu, Adina .
2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, :146-154
[49]   General factorization framework for context-aware recommendations [J].
Hidasi, Balazs ;
Tikk, Domonkos .
DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 30 (02) :342-371
[50]   A context-aware framework for mobile computing environment [J].
Kim, Hoon-Kyu ;
Kim, Choung-Seok ;
Kim, Kyung-Chang .
Lecture Notes in Electrical Engineering, 2015, 373 :325-330