Boost-Defence for resilient IoT networks: A head-to-toe approach

被引:30
作者
Abu Al-Haija, Qasem [1 ]
Al Badawi, Ahmad [2 ]
Bojja, Giridhar Reddy [3 ]
机构
[1] Princess Sumaya Univ Technol, Dept Comp Sci Cybersecur, Amman, Jordan
[2] Rabdan Acad RA, Dept Homeland Secur, Abu Dhabi, U Arab Emirates
[3] Dakota State Univ, Coll Business & Informat Syst, Madison, SD USA
关键词
classification methods; cyber security; internet of things; intrusion detection systems; machine learning; supervised learning; CHALLENGES; SECURITY; INTERNET; ATTACKS; THINGS; IIOT;
D O I
10.1111/exsy.12934
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is an emerging technology that is considered a key enabler for next-generation smart cities, industries, security services and economies. IoT networks allow connected devices to communicate with each other automatically without human intervention which empowers innovative solutions for pressing challenges and limitations of current technologies required to materialize smart environments. Due to the concrete involvement of IoT networks in critical infrastructures and cyber-physical systems, defending them against cyber-attacks has led to extensive research efforts to propose effective countermeasures against such attacks. In this work, we present Boost-Defence: a framework to secure IoT networks from a large vector of cyber-attacks at different IoT layers. We employ the AdaBoost machine learning technique combined with Decision Trees and extensive data engineering techniques to construct a robust classifier for detecting and classifying several cyber-attacks in IoT networks. We evaluate our system on the TON_IoT_2020 datasets, a collection of datasets compiled specifically for 3-layered IoT systems comprising: physical, network and application layers. We contrast the performance of our system against existing state-of-the-art solutions. Our experimental analysis demonstrates the capability of our framework in providing superior classification accuracy and lower types 1 and 2 errors for constructing more resilient IoT infrastructures.
引用
收藏
页数:15
相关论文
共 51 条
  • [11] From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
    Augusto-Gonzalez, J.
    Collen, A.
    Evangelatos, S.
    Anagnostopoulos, M.
    Spathoulas, G.
    Giannoutakis, K. M.
    Votis, K.
    Tzovaras, D.
    Genge, B.
    Gelenbe, E.
    Nijdam, N. A.
    [J]. 2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
  • [12] Baldini G., 2020, IOT NETWORK RISK ASS, P88
  • [13] Booij T.M., 2021, IEEE INTERNET THINGS, V9, P485
  • [14] Cekerevac Z., 2017, MEST J, V5, P15, DOI DOI 10.12709/MEST.05.05.02.03
  • [15] The cyber threat landscape: Challenges and future research directions
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & SECURITY, 2011, 30 (08) : 719 - 731
  • [16] Collen A., 2018, Ghost-safe-guarding home IoT environments with personalised real-time risk control
  • [17] Internet of Things: A survey on machine learning-based intrusion detection approaches
    da Costa, Kelton A. P.
    Papa, Joao P.
    Lisboa, Celso O.
    Munoz, Roberto
    de Albuquerque, Victor Hugo C.
    [J]. COMPUTER NETWORKS, 2019, 151 : 147 - 157
  • [18] Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
  • [19] Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project
    Domanska, Joanna
    Gelenbe, Erol
    Czachorski, Tadek
    Drosou, Anastasis
    Tzovaras, Dimitrios
    [J]. SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018, 2018, 821 : 101 - 118
  • [20] A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
    Dong, Shi
    Abbas, Khushnood
    Jain, Raj
    [J]. IEEE ACCESS, 2019, 7 : 80813 - 80828