Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks

被引:23
作者
Abu Al-Haija, Qasem [1 ]
机构
[1] Princess Sumaya Univ Technol PSUT, Dept Cybersecur, Amman, Jordan
来源
FRONTIERS IN BIG DATA | 2022年 / 4卷
关键词
IoT communications; machine learning; shallow neural network; deep neural network; convolutional neural network; cyberattacks detection; systems engineering; INTERNET; ATTACKS;
D O I
10.3389/fdata.2021.782902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prompt revolution and emergence of smart, self-reliant, and low-power devices, Internet of Things (IoT) has inconceivably expanded and impacted almost every real-life application. Nowadays, for example, machines and devices are now fully reliant on computer control and, instead, they have their own programmable interfaces, such as cars, unmanned aerial vehicles (UAVs), and medical devices. With this increased use of IoT, attack capabilities have increased in response, which became imperative that new methods for securing these systems be developed to detect attacks launched against IoT devices and gateways. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. In this research, we present new efficient and generic top-down architecture for intrusion detection, and classification in IoT networks using non-traditional machine learning is proposed in this article. The proposed architecture can be customized and used for intrusion detection/classification incorporating any IoT cyber-attack datasets, such as CICIDS Dataset, MQTT dataset, and others. Specifically, the proposed system is composed of three subsystems: feature engineering (FE) subsystem, feature learning (FL) subsystem, and detection and classification (DC) subsystem. All subsystems have been thoroughly described and analyzed in this article. Accordingly, the proposed architecture employs deep learning models to enable the detection of slightly mutated attacks of IoT networking with high detection/classification accuracy for the IoT traffic obtained from either real-time system or a pre-collected dataset. Since this work employs the system engineering (SE) techniques, the machine learning technology, the cybersecurity of IoT systems field, and the collective corporation of the three fields have successfully yielded a systematic engineered system that can be implemented with high-performance trajectories.
引用
收藏
页数:18
相关论文
共 62 条
[1]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[2]  
Abu Al-Haija Q, 2019, INT CONF INFORM COMM, P47, DOI [10.1109/IACS.2019.8809125, 10.1109/iacs.2019.8809125]
[3]  
Abu Taher K, 2019, 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), P643, DOI [10.1109/ICREST.2019.8644161, 10.1109/icrest.2019.8644161]
[4]  
Aggarwal C.C., 2018, Neural Networks and Deep Learning, DOI DOI 10.1007/978-3-319-94463-0_2
[5]  
Al-Haija Q A., 2021, 12 INT NETW C INC 20, P100, DOI [10.1007/978-3-030-64758-2_8, DOI 10.1007/978-3-030-64758-2_8]
[6]  
Al-Haija Q.A., 2017, IEEE INT C INT TECHN, DOI [10.1109/ITCOSP.2017.8303103, DOI 10.1109/ITCOSP.2017.8303103]
[7]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[8]  
Ambedkar C., 2015, International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), VVol2, P25
[9]  
Amouri A, 2018, 2018 IEEE 19TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON)
[10]  
[Anonymous], 2008, ISO/IEC: 15288:2008 System life cycle processes