IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework

被引:31
|
作者
Wheelus, Charles [1 ]
Zhu, Xingquan [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
来源
IOT | 2020年 / 1卷 / 02期
关键词
internet of things; network security; threats; machine learning; security analytics; INTERNET; THINGS;
D O I
10.3390/iot1020016
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical world. Driven by the IoT, with each passing day, the Internet becomes more integrated with everyday life. While IoT devices provide endless new capabilities and make life more convenient, they also vastly increase the opportunity for nefarious individuals, criminal organizations and even state actors to spy on, and interfere with, unsuspecting users of IoT systems. As this looming crisis continues to grow, calls for data science approaches to address these problems have increased, and current research shows that predictive models trained with machine learning algorithms hold great potential to mitigate some of these issues. In this paper, we first carry out an analytics approach to review security risks associated with IoT systems, and then propose a machine learning-based solution to characterize and detect IoT attacks. We use a real-world IoT system with secured gate access as a platform, and introduce the IoT system in detail, including features to capture security threats/attacks to the system. By using data collected from a nine month period as our testbed, we evaluate the efficacy of predictive models trained by means of machine learning, and propose design principles and a loose framework for implementing secure IoT systems.
引用
收藏
页码:259 / 285
页数:27
相关论文
共 50 条
  • [1] Research on Security Risks and Defense Methods of Data-driven Algorithms in Power Systems
    Liu, Zengji
    Wang, Qi
    Xue, Tong
    Tang, Yi
    [J]. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2023, 43 (12): : 4538 - 4553
  • [2] Value of data meets IT security - assessing IT security risks in data-driven value chains
    Bitomsky, Laura
    Buerger, Olga
    Haeckel, Bjoern
    Toeppel, Jannick
    [J]. ELECTRONIC MARKETS, 2020, 30 (03) : 589 - 605
  • [3] Value of data meets IT security – assessing IT security risks in data-driven value chains
    Laura Bitomsky
    Olga Bürger
    Björn Häckel
    Jannick Töppel
    [J]. Electronic Markets, 2020, 30 : 589 - 605
  • [4] Attack and Defense: Adversarial Security of Data-Driven FDC Systems
    Zhuo, Yue
    Yin, Zhenqin
    Ge, Zhiqiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 5 - 19
  • [5] Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach
    Tarahomi, Sousan
    Holz, Ralph
    Sperotto, Anna
    [J]. 2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 346 - 349
  • [6] Enhancing maritime transportation security: A data-driven Bayesian network analysis of terrorist attack risks
    Mohsendokht, Massoud
    Li, Huanhuan
    Kontovas, Christos
    Chang, Chia-Hsun
    Qu, Zhuohua
    Yang, Zaili
    [J]. RISK ANALYSIS, 2024,
  • [7] Toward a Data-Driven Cognitive Framework for Adaptive QoS in IoT
    Ateeq, Muhammad
    Afzal, Muhammad Khalil
    Habib, Hina
    [J]. IEEE INTERNET COMPUTING, 2022, 26 (06) : 78 - 87
  • [8] The Threats and Risks in Personal Data Security
    Yildirim, Ebru Yeniman
    Adali, Esref
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 610 - 615
  • [9] Multi-Source Knowledge Reasoning for Data-Driven IoT Security
    Zhang, Shuqin
    Bai, Guangyao
    Li, Hong
    Liu, Peipei
    Zhang, Minzhi
    Li, Shujun
    [J]. SENSORS, 2021, 21 (22)
  • [10] A Data-Driven Evaluation for Insider Threats
    Sun, Yuqing
    Xu, Haoran
    Bertino, Elisa
    Sun, Chao
    [J]. DATA SCIENCE AND ENGINEERING, 2016, 1 (02) : 73 - 85