A Machine Learning Security Framework for Iot Systems

被引:93
作者
Bagaa, Miloud [1 ]
Taleb, Tarik [1 ,3 ,4 ]
Bernabe, Jorge Bernal [2 ]
Skarmeta, Antonio [2 ]
机构
[1] Aalto Univ, Sch Elect Engn, Dept Commun & Networking, Espoo 02150, Finland
[2] Univ Murcia, Dept Commun & Informat Engn, Murcia 30001, Spain
[3] Sejong Univ, Dept Comp & Informat Secur, Seoul 05006, South Korea
[4] Univ Oulu, Ctr Wireless Commun CWC, Oulu 90570, Finland
基金
芬兰科学院; 欧盟地平线“2020”;
关键词
Machine learning; Intrusion detection; Internet of Things; Computer security; Software; security; artificial intelligence; SDN; NFV; orchestration and MANO; INTRUSION DETECTION; INTERNET;
D O I
10.1109/ACCESS.2020.2996214
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things security is attracting a growing attention from both academic and industry communities. Indeed, IoT devices are prone to various security attacks varying from Denial of Service (DoS) to network intrusion and data leakage. This paper presents a novel machine learning (ML) based security framework that automatically copes with the expanding security aspects related to IoT domain. This framework leverages both Software Defined Networking (SDN) and Network Function Virtualization (NFV) enablers for mitigating different threats. This AI framework combines monitoring agent and AI-based reaction agent that use ML-Models divided into network patterns analysis, along with anomaly-based intrusion detection in IoT systems. The framework exploits the supervised learning, distributed data mining system and neural network for achieving its goals. Experiments results demonstrate the efficiency of the proposed scheme. In particular, the distribution of the attacks using the data mining approach is highly successful in detecting the attacks with high performance and low cost. Regarding our anomaly-based intrusion detection system (IDS) for IoT, we have evaluated the experiment in a real Smart building scenario using one-class SVM. The detection accuracy of anomalies achieved 99.71%. A feasibility study is conducted to identify the current potential solutions to be adopted and to promote the research towards the open challenges.
引用
收藏
页码:114066 / 114077
页数:12
相关论文
共 49 条
[1]  
Akshaya P., 2016, INT J ENG COMPUT SCI, V5
[2]   Providing secure and reliable communication for next generation networks in smart cities [J].
Al Ridhawi, Ismaeel ;
Otoum, Safa ;
Aloqaily, Moayad ;
Jararweh, Yaser ;
Baker, Thar .
SUSTAINABLE CITIES AND SOCIETY, 2020, 56
[3]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[4]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[5]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[6]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[7]   Minutiae filtering using ridge-valley method [J].
Ameller F, Marco A. ;
Gonzalez, Angelica .
ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2016, 5 (01) :1-10
[8]  
[Anonymous], 2019, 002 ETSI GS ZSM
[9]   Assessing Lightweight Virtualization for Security-as-a-Service at the Network Edge [J].
Boudi, Abderrahmane ;
Farris, Ivan ;
Bagaa, Miloud ;
Taleb, Tarik .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2019, E102B (05) :970-977
[10]   In-network outlier detection in wireless sensor networks [J].
Branch, Joel W. ;
Giannella, Chris ;
Szymanski, Boleslaw ;
Wolff, Ran ;
Kargupta, Hillol .
KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (01) :23-54