Verification Based Scheme to Restrict IoT Attacks

被引:0
|
作者
Kaur, Barjinder [1 ]
Dadkhah, Sajjad [1 ]
Xiong, Pulei [2 ]
Iqbal, Shahrear [3 ]
Ray, Suprio [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] UNB, Fac Comp Sci, Fredericton, NB, Canada
[2] CNR, Cybersecur, Fredericton, NB, Canada
[3] CNR, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; cyber security; unkown attacks; intrusion detection; machine learning; ROC; ANOMALY DETECTION;
D O I
10.1145/3492324.3494170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier's categorization of a given record while ignoring its confidence. This paper proposes a verification-based scheme to reject IoT attacks by utilizing the classifier's confidence. At the same time, existing studies are evaluated using traditional cross-validation approaches (e.g., k-fold), thus, not tested against unknown attacks. We propose using the leave-one-attack-out (LOAO) cross-validation scheme to evaluate the generalizability of the application to unknown attacks. The experiments are performed on Med BIoT, a publicly available dataset consisting of three IoT attacks. The system's robustness is evaluated in terms of Receiver Operating Curves (ROC) and Equal Error rates (EERs). The results indicate a lower false-positive rate of 12.6% using the proposed verification-based approach in comparison to k-fold cross-validation.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [31] Blockchain Based Credibility Verification Method for IoT Entities
    Qu, Chao
    Tao, Ming
    Zhang, Jie
    Hong, Xiaoyu
    Yuan, Ruifen
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [32] Lightweight Authentication Scheme Based on ECC for IoT
    Sweta Mishra
    Bhaskar Mondal
    Rishi Kumar Jha
    SN Computer Science, 5 (7)
  • [33] SCHEME OF IOT MIDDLEWARE BASED ON MESSAGE SERVICE
    Qu, Weiqing
    Zhou, Chunliang
    Zhang, Qi
    Liu, Jun
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2019, 81 (03): : 15 - 26
  • [34] PUF based IoT Device Authentication Scheme
    Kim, Byoungkoo
    Yoon, Seoungyong
    Kang, Yousung
    Choi, Dooho
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 1460 - 1462
  • [35] Unveiling the Energy-Based Validation and Verification (EVV) Method for Perceiving and Averting Rank Inconsistency Attacks (RIA) for Guarding IoT Routing
    Ramu K.
    Gomathi N.
    Suman S.K.
    Josephson P.J.
    Vadivukarassi M.
    Lavudiya N.S.
    Bhagyalakshmi L.
    SN Computer Science, 5 (2)
  • [36] An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
    Pallavi, Sode
    Narayanan, V. Anantha
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 694 - 698
  • [37] Autoencoder-based feature construction for IoT attacks clustering
    Haseeb, Junaid
    Mansoori, Masood
    Hirose, Yuichi
    Al-Sahaf, Harith
    Welch, Ian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 487 - 502
  • [38] Provable data possession scheme based on public verification and private verification
    Tian J.
    Chai M.
    Qi L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (03): : 48 - 59
  • [39] DETONAR: Detection of Routing Attacks in RPL-Based IoT
    Agiollo, Andrea
    Conti, Mauro
    Kaliyar, Pallavi
    Lin, Tsung-Nan
    Pajola, Luca
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1178 - 1190
  • [40] IoT Botnet Attacks Detection and Classification Based on Ensemble Learning
    Cao, Yongzhong
    Wang, Zhihui
    Ding, Hongwei
    Zhang, Jiale
    Li, Bin
    ARTIFICIAL INTELLIGENCE AND ROBOTICS, ISAIR 2023, 2024, 1998 : 45 - 55