Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

被引:43
作者
Iwendi, Celestine [1 ]
Rehman, Saif Ur [2 ]
Javed, Abdul Rehman [2 ]
Khan, Suleman [2 ]
Srivastava, Gautam [3 ,4 ]
机构
[1] BCC Cent South Univ Forestry & Technol, Dept Elect, Changsha 410004, Peoples R China
[2] Air Univ, Dept Comp Sci, Islamabad 44300, Pakistan
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[4] China Med Univ, Res Ctr Internenral Comp, Taichung 40402, Taiwan
基金
加拿大自然科学与工程研究理事会;
关键词
Cybersecurity; DDoS; IDS; deep learning; network traffic; IoT;
D O I
10.1145/3448614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business' operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.
引用
收藏
页数:22
相关论文
共 57 条
  • [1] mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines
    Ahmadi, Reza
    Jahed, Karim
    Dingel, Juergen
    [J]. 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1182 - 1185
  • [2] Ahmed A, 2018, DES AUT TEST EUROPE, P1538, DOI 10.23919/DATE.2018.8342260
  • [3] QUEBS: Qualifying Event Based Search in Concolic Testing for Validation of RTL Models
    Ahmed, Alif
    Mishra, Prabhat
    [J]. 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 185 - 192
  • [4] Ai Gu, 2018, 2018 IEEE International Conference on Information and Automation (ICIA). Proceedings, P1669, DOI 10.1109/ICInfA.2018.8812335
  • [5] A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things
    Alnumay, Waleed
    Ghosh, Uttam
    Chatterjee, Pushpita
    [J]. SENSORS, 2019, 19 (06)
  • [6] Realizing Efficient Security and Privacy in IoT Networks
    Anajemba, Joseph Henry
    Tang, Yue
    Iwendi, Celestine
    Ohwoekevwo, Akpesiri
    Srivastava, Gautam
    Jo, Ohyun
    [J]. SENSORS, 2020, 20 (09)
  • [7] Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things
    Batra, Isha
    Verma, Sahil
    Malik, Arun
    Kavita
    Ghosh, Uttam
    Rodrigues, Joel J. P. C.
    Nguyen, Gia Nhu
    Hosen, A. S. M. Sanwar
    Mariappan, Vinayagam
    [J]. SUSTAINABILITY, 2020, 12 (14)
  • [8] Automatically Generating Search Heuristics for Concolic Testing
    Cha, Sooyoung
    Hong, Seongjoon
    Lee, Junhee
    Oh, Hakjoo
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 1244 - 1254
  • [9] Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks
    Cui, Mingjian
    Wang, Jianhui
    Yue, Meng
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5724 - 5734
  • [10] Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems
    El Hachem, Jamal
    Sedaghatbaf, Ali
    Lisova, Elena
    Causevic, Aida
    [J]. 2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), 2019, : 363 - 370