Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

被引:48
作者
Iwendi, Celestine [1 ]
Rehman, Saif Ur [2 ]
Javed, Abdul Rehman [2 ]
Khan, Suleman [2 ]
Srivastava, Gautam [3 ,4 ]
机构
[1] BCC Cent South Univ Forestry & Technol, Dept Elect, Changsha 410004, Peoples R China
[2] Air Univ, Dept Comp Sci, Islamabad 44300, Pakistan
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[4] China Med Univ, Res Ctr Internenral Comp, Taichung 40402, Taiwan
基金
加拿大自然科学与工程研究理事会;
关键词
Cybersecurity; DDoS; IDS; deep learning; network traffic; IoT;
D O I
10.1145/3448614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business' operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.
引用
收藏
页数:22
相关论文
共 57 条
[1]   mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines [J].
Ahmadi, Reza ;
Jahed, Karim ;
Dingel, Juergen .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :1182-1185
[2]  
Ahmed A, 2018, DES AUT TEST EUROPE, P1538, DOI 10.23919/DATE.2018.8342260
[3]   QUEBS: Qualifying Event Based Search in Concolic Testing for Validation of RTL Models [J].
Ahmed, Alif ;
Mishra, Prabhat .
2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, :185-192
[4]  
Ai Gu, 2018, 2018 IEEE International Conference on Information and Automation (ICIA). Proceedings, P1669, DOI 10.1109/ICInfA.2018.8812335
[5]   A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things [J].
Alnumay, Waleed ;
Ghosh, Uttam ;
Chatterjee, Pushpita .
SENSORS, 2019, 19 (06)
[6]   Realizing Efficient Security and Privacy in IoT Networks [J].
Anajemba, Joseph Henry ;
Tang, Yue ;
Iwendi, Celestine ;
Ohwoekevwo, Akpesiri ;
Srivastava, Gautam ;
Jo, Ohyun .
SENSORS, 2020, 20 (09)
[7]   Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things [J].
Batra, Isha ;
Verma, Sahil ;
Malik, Arun ;
Kavita ;
Ghosh, Uttam ;
Rodrigues, Joel J. P. C. ;
Nguyen, Gia Nhu ;
Hosen, A. S. M. Sanwar ;
Mariappan, Vinayagam .
SUSTAINABILITY, 2020, 12 (14)
[8]   Automatically Generating Search Heuristics for Concolic Testing [J].
Cha, Sooyoung ;
Hong, Seongjoon ;
Lee, Junhee ;
Oh, Hakjoo .
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, :1244-1254
[9]   Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks [J].
Cui, Mingjian ;
Wang, Jianhui ;
Yue, Meng .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :5724-5734
[10]   Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems [J].
El Hachem, Jamal ;
Sedaghatbaf, Ali ;
Lisova, Elena ;
Causevic, Aida .
2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), 2019, :363-370