SALT: transfer learning-based threat model for attack detection in smart home

被引:0
作者
Pooja Anand
Yashwant Singh
Harvinder Singh
Mohammad Dahman Alshehri
Sudeep Tanwar
机构
[1] Central University of Jammu,Department of Computer Science and Information Technology
[2] Leaders Institute,Centre for Artificial Intelligence Research and Optimisation
[3] Woolloongabba,Department of Computer Science, College of Computers and Information Technology
[4] Torrens University Australia,Department of Computer Science and Engineering, Institute of Technology
[5] Taif University,undefined
[6] Nirma University,undefined
来源
Scientific Reports | / 12卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which has facilitated every entity the power to connect to the web. However, this magnifying depth of the digital pool oil the wheels for the attackers to penetrate. Thus, these threats and attacks have become a prime concern among researchers. With promising features, Machine Learning (ML) has been the solution throughout to detect these threats. But, the general ML-based solutions have been declining with the practical implementation to detect unknown threats due to changes in domains, different distributions, long training time, and lack of labelled data. To tackle the aforementioned issues, Transfer Learning (TL) has emerged as a viable solution. Motivated by the facts, this article aims to leverage TL-based strategies to get better the learning classifiers to detect known and unknown threats targeting IoT systems. TL transfers the knowledge attained while learning a task to expedite the learning of new similar tasks/problems. This article proposes a learning-based threat model for attack detection in the Smart Home environment (SALT). It uses the knowledge of known threats in the source domain (labelled data) to detect the unknown threats in the target domain (unlabelled data). The proposed scheme addresses the workable differences in feature space distribution or the ratio of attack instances to a normal one, or both. The proposed threat model would show the implying competence of ML with the TL scheme to improve the robustness of learning classifiers besides the threat variants to detect known and unknown threats. The performance analysis shows that traditional schemes underperform for unknown threat variants with accuracy dropping to 39% and recall to 56.
引用
收藏
相关论文
共 58 条
[1]  
Jadav N(2022)Deep learning and onion routing-based collaborative intelligence framework for smart homes underlying 6g networks IEEE Trans. Netw. Serv. Manag. 67 1-39
[2]  
Kakkar R(2022)Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5g J. Inf. Secur. Appl. 5 1712-1721
[3]  
Gupta R(2021)Blockchain-based data dissemination scheme for 5g-enabled softwarized UAV networks IEEE Trans. Green Commun. Netw. 39 e12829-168853
[4]  
Agrawal S(2021)Ivqfiot: Intelligent vulnerability quantification framework for scoring internet of things vulnerabilities Expert Syst. 8 168825-367
[5]  
Tanwar S(2020)IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges IEEE Access 6 361-323
[6]  
Gupta R(2020)Deep transductive transfer learning framework for zero-day attack detection ICT Express 7 314-147
[7]  
Patel MM(2019)A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks IEEE Trans. Emerg. Top. Comput. 12 1223-107344
[8]  
Tanwar S(2019)Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis Energies 55 137-13
[9]  
Kumar N(2021)Design of anomaly-based intrusion detection system using fog computing for IoT network Autom. Control Comput. Sci. 101 102031-undefined
[10]  
Zeadally S(2020)Deep recurrent neural network for IoT intrusion detection system Simul. Model. Pract. Theory 9 173-undefined