Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

被引:43
作者
Iwendi, Celestine [1 ]
Rehman, Saif Ur [2 ]
Javed, Abdul Rehman [2 ]
Khan, Suleman [2 ]
Srivastava, Gautam [3 ,4 ]
机构
[1] BCC Cent South Univ Forestry & Technol, Dept Elect, Changsha 410004, Peoples R China
[2] Air Univ, Dept Comp Sci, Islamabad 44300, Pakistan
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[4] China Med Univ, Res Ctr Internenral Comp, Taichung 40402, Taiwan
基金
加拿大自然科学与工程研究理事会;
关键词
Cybersecurity; DDoS; IDS; deep learning; network traffic; IoT;
D O I
10.1145/3448614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business' operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.
引用
收藏
页数:22
相关论文
共 57 条
  • [31] COMPI: Concolic Testing for MPI Applications
    Li, Hongbo
    Li, Sihuan
    Benavides, Zachary
    Chen, Zizhong
    Gupta, Rajiv
    [J]. 2018 32ND IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), 2018, : 865 - 874
  • [32] Lin B, 2018, INT SYM QUAL ELECT, P1, DOI 10.1109/ISQED.2018.8357256
  • [33] Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach
    Lin, Xi
    Li, Jianhua
    Wu, Jun
    Liang, Haoran
    Yang, Wu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6367 - 6378
  • [34] An Architecture for Accountable Anonymous Access in the Internet-of-Things Network
    Ma, Yuxiang
    Wu, Yulei
    Ge, Jingguo
    Li, Jun
    [J]. IEEE ACCESS, 2018, 6 : 14451 - 14461
  • [35] Majumdar R, 2007, PROC INT CONF SOFTW, P416
  • [36] Matsuda W, 2019, 2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P54, DOI [10.1109/ains47559.2019.8968698, 10.1109/AINS47559.2019.8968698]
  • [37] McAfee Patrick, 2017, 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). Proceedings, P213, DOI 10.1109/MOBILESoft.2017.35
  • [38] Perera I, 2018, IEEE INT CONF BIG DA, P3001, DOI 10.1109/BigData.2018.8622106
  • [39] Pinto Sonal, 2017, P IEEE INT TEST C IT, P1
  • [40] A Case Study of Concolic Testing Tools and Their Limitations
    Qu, Xiao
    Robinson, Brian
    [J]. 2011 FIFTH INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2011), 2011, : 117 - 126