A threat intelligence framework for protecting smart satellite-based healthcare networks

被引:14
作者
Al-Hawawreh, Muna [1 ]
Moustafa, Nour [1 ]
Slay, Jill [2 ]
机构
[1] UNSW Canberra, ADFA, Sch Engn & Informat Technol, Campbell, Australia
[2] Univ South Australia, Adelaide, SA, Australia
关键词
Smart satellite; IIoHT; DDoS; Ransom; Machine learning; INDUSTRIAL INTERNET;
D O I
10.1007/s00521-021-06441-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical assets. Lightweight protocols, such as constrained application protocol (CoAP), have been widely utilised in transferring sensing data of medical devices to end-users in smart satellite-based healthcare IIoT networks (SmartSat-IIoHT). However, such protocols are extensively deployed without appropriate security configurations, making attackers' mission easier for abusing these protocols to launch advanced cyber threats. This paper, therefore, presents a new threat intelligence framework to examine and model CoAP protocol's attacks in these systems. We present a ransom denial of service (RDoS) as a new threat that would exploit this protocol's vulnerabilities. We propose many RDoS attack's techniques to understand the attack indicators and analyse their behaviour on systems. Moreover, we present a real-time discovery of attacks' network behaviours using deep learning. The experiment results demonstrate that this proposed discovery model obtains a better performance in revealing RDoS than other conventional machine learning algorithms and accomplishing high fidelity of protecting SmartSat-IIoHT networks.
引用
收藏
页码:15 / 35
页数:21
相关论文
共 52 条
[1]  
Al-Hawawreh Muna Sulieman, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P236, DOI 10.1109/ICITECH.2017.8080006
[2]   Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks [J].
Al-Hawawreh, Muna ;
Moustafa, Nour ;
Garg, Sahil ;
Hossain, M. Shamim .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04) :2968-2981
[3]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[4]  
Alexander O., 2020, MITRE ATT&CK for Industrial Control Systems: design and philosophy
[5]  
Asert, 2019, COAP ATT WILD
[6]  
Bediya Arun Kumar, 2020, 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), P824, DOI 10.1109/GUCON48875.2020.9231139
[7]  
Bhatt P, 2018, 2018 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, EMBEDDED SYSTEMS AND COMMUNICATIONS (IINTEC), P191, DOI 10.1109/IINTEC.2018.8695303
[8]  
Brown R., 2019, The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey
[9]  
CANUTO L, 2019, 2019 14 IB C INF SYS
[10]  
Chamola, 2020, IEEE J SEL AREAS COM