Verification Based Scheme to Restrict IoT Attacks

被引:0
|
作者
Kaur, Barjinder [1 ]
Dadkhah, Sajjad [1 ]
Xiong, Pulei [2 ]
Iqbal, Shahrear [3 ]
Ray, Suprio [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] UNB, Fac Comp Sci, Fredericton, NB, Canada
[2] CNR, Cybersecur, Fredericton, NB, Canada
[3] CNR, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; cyber security; unkown attacks; intrusion detection; machine learning; ROC; ANOMALY DETECTION;
D O I
10.1145/3492324.3494170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier's categorization of a given record while ignoring its confidence. This paper proposes a verification-based scheme to reject IoT attacks by utilizing the classifier's confidence. At the same time, existing studies are evaluated using traditional cross-validation approaches (e.g., k-fold), thus, not tested against unknown attacks. We propose using the leave-one-attack-out (LOAO) cross-validation scheme to evaluate the generalizability of the application to unknown attacks. The experiments are performed on Med BIoT, a publicly available dataset consisting of three IoT attacks. The system's robustness is evaluated in terms of Receiver Operating Curves (ROC) and Equal Error rates (EERs). The results indicate a lower false-positive rate of 12.6% using the proposed verification-based approach in comparison to k-fold cross-validation.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [21] IoT Security based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme
    Gad, Ramadan
    Abd El-Latif, Ahmed
    Elseuofi, Sherif
    Ibrahim, Hany M.
    Elmezain, Mahmoud
    Said, Wael
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [22] HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme for Internet of Things
    Hossain, Mahmud
    Noor, Shahid
    Hasan, Ragib
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 109 - 116
  • [23] A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation
    Ahmadi, Khatereh
    Javidan, Reza
    IET INFORMATION SECURITY, 2024, 2024
  • [24] Defense Scheme to Protect IoT from Cyber Attacks using AI Principles
    Ahamed, T.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2018, 13 (06) : 915 - 926
  • [25] Kafka-Shield: Kafka Streams-based distributed detection scheme for IoT traffic-based DDoS attacks
    Shukla, Praveen
    Krishna, C. Rama
    Patil, Nilesh Vishwasrao
    SECURITY AND PRIVACY, 2024, 7 (06):
  • [26] A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
    Haseeb, Junaid
    Mansoori, Masood
    Welch, Ian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 557 - 567
  • [27] Detection of Attacks in IoT Based on Ontology Using SPARQL
    Mittal, Mohit
    Vijayal, Shafalika
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 206 - 211
  • [28] Security Attacks on IoT
    Okul, S.
    Aydin, M. Ali
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 1 - 5
  • [29] Attacks on a Block Based SVD Watermarking Scheme
    Ling, Huo-Chong
    Heng, Swee-Huay
    Goi, Bok-Min
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 371 - +
  • [30] Scheme of IOT middleware based on message service
    Qu, Weiqing
    Zhou, Chunliang
    Zhang, Qi
    Liu, Jun
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2019, 81 (03): : 15 - 26