Verification Based Scheme to Restrict IoT Attacks

被引:0
|
作者
Kaur, Barjinder [1 ]
Dadkhah, Sajjad [1 ]
Xiong, Pulei [2 ]
Iqbal, Shahrear [3 ]
Ray, Suprio [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] UNB, Fac Comp Sci, Fredericton, NB, Canada
[2] CNR, Cybersecur, Fredericton, NB, Canada
[3] CNR, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; cyber security; unkown attacks; intrusion detection; machine learning; ROC; ANOMALY DETECTION;
D O I
10.1145/3492324.3494170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier's categorization of a given record while ignoring its confidence. This paper proposes a verification-based scheme to reject IoT attacks by utilizing the classifier's confidence. At the same time, existing studies are evaluated using traditional cross-validation approaches (e.g., k-fold), thus, not tested against unknown attacks. We propose using the leave-one-attack-out (LOAO) cross-validation scheme to evaluate the generalizability of the application to unknown attacks. The experiments are performed on Med BIoT, a publicly available dataset consisting of three IoT attacks. The system's robustness is evaluated in terms of Receiver Operating Curves (ROC) and Equal Error rates (EERs). The results indicate a lower false-positive rate of 12.6% using the proposed verification-based approach in comparison to k-fold cross-validation.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [1] Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication
    Celes, A. Asline
    Elizabeth, N. Edna
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 388 - 392
  • [2] Formal verification for security and attacks in IoT physical layer
    Toman Z.H.
    Hamel L.
    Toman S.H.
    Graiet M.
    Valadares D.C.G.
    Journal of Reliable Intelligent Environments, 2024, 10 (1) : 73 - 91
  • [3] Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment
    Prasetyo, Heri
    Hsia, Chih-Hsien
    Liu, Chin-Hua
    IEEE ACCESS, 2020, 8 (08): : 69919 - 69936
  • [4] Trust-based Intelligent Scheme for Mitigating Black Hole Attacks in IoT
    Feroz Khan AB
    Weslin D
    Dilli Babu M
    Mohammed Muzaffar Hussain
    Journal of Harbin Institute of Technology(New Series), 2024, (03) : 39 - 50
  • [5] A Sequential Scheme for Detecting Cyber Attacks in IoT Environment
    Soe, Yan Naung
    Feng, Yaokai
    Santosa, Paulus Insap
    Hartanto, Rudy
    Sakurai, Kouichi
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 238 - 244
  • [6] A Novel Verification scheme for Resisting Password Guessing Attacks
    Guan, Albert
    Chen, Chia-Mei
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [7] Defense for Selective Attacks in the IoT with a Distributed Trust Management Scheme
    Mendoza, Carolina V. L.
    Kleinschmidt, Joao H.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS - 20TH IEEE ISCE, 2016, : 53 - 54
  • [8] THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network
    Fang, Liming
    Li, Yang
    Yun, Xinyu
    Wen, Zhenyu
    Ji, Shouling
    Meng, Weizhi
    Cao, Zehong
    Tanveer, M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 5745 - 5759
  • [9] A Novel Verification Scheme to Resist Online Password Guessing Attacks
    Guan, Albert
    Chen, Chia-Mei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4285 - 4293
  • [10] A Null-space-based Verification Scheme for Coded Edge Computing against Pollution Attacks
    Fu, Mingjia
    Wang, Jin
    Zhou, Jingya
    Wang, Jianping
    Lu, Kejie
    Zhou, Xiaobo
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 454 - 461