Verification Based Scheme to Restrict IoT Attacks

被引:0
|
作者
Kaur, Barjinder [1 ]
Dadkhah, Sajjad [1 ]
Xiong, Pulei [2 ]
Iqbal, Shahrear [3 ]
Ray, Suprio [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] UNB, Fac Comp Sci, Fredericton, NB, Canada
[2] CNR, Cybersecur, Fredericton, NB, Canada
[3] CNR, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; cyber security; unkown attacks; intrusion detection; machine learning; ROC; ANOMALY DETECTION;
D O I
10.1145/3492324.3494170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-attacks have become a serious threat over the Internet. These devices have low memory capacity and processing power, which makes them easy targets for attackers. The research community has proposed different approaches to deal with emerging variants of attacks on IoT devices using various machine learning techniques. However, these approaches rely heavily on the classifier's categorization of a given record while ignoring its confidence. This paper proposes a verification-based scheme to reject IoT attacks by utilizing the classifier's confidence. At the same time, existing studies are evaluated using traditional cross-validation approaches (e.g., k-fold), thus, not tested against unknown attacks. We propose using the leave-one-attack-out (LOAO) cross-validation scheme to evaluate the generalizability of the application to unknown attacks. The experiments are performed on Med BIoT, a publicly available dataset consisting of three IoT attacks. The system's robustness is evaluated in terms of Receiver Operating Curves (ROC) and Equal Error rates (EERs). The results indicate a lower false-positive rate of 12.6% using the proposed verification-based approach in comparison to k-fold cross-validation.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [41] Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    Thejas, V
    2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [42] Assessment of Buffer Overflow Based Attacks On an IoT Operating System
    Mullen, Gary
    Meany, Liam
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [43] An NTP-based Detection Module for DDoS Attacks on IoT
    Kawamura, Tamotsu
    Fukushi, Masaru
    Hirano, Yasushi
    Fujita, Yusuke
    Hamamoto, Yoshihiko
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [44] Impact Of Availability Attacks On Enabling IoT Based Healthcare Applications
    Al-Abadi, Abdullah Ali Jawad
    Mohamed, Mbarka Belhaj
    Fakhfakh, Ahmed
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1666 - 1671
  • [45] Cyber Attacks Classification in IoT-based-Healthcare Infrastructure
    Djenna, Amir
    Saidouni, Djamel Eddine
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [46] DTW based verification scheme of biometric signatures
    Kar, Biswajit
    Dutta, P. K.
    Basu, T. K.
    VielHauer, Claus
    Dittmarm, Jana
    2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, 2006, : 2908 - +
  • [47] PUF-based IoT Device Authentication Scheme on IoT Open Platform
    Kim, Byoungkoo
    Yoon, Seungyong
    Kang, Yousung
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1873 - 1875
  • [48] A Security Scheme for Statistical Anomaly Detection and the Mitigation of Rank Attacks in RPL Networks (IoT Environment)
    Alqarni, Mohammed A.
    Chauhdary, Sajjad Hussain
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (06) : 12409 - 12414
  • [49] PCA-Based Adversarial Attacks on Signature Verification Systems
    Jahangir, Maham
    Basa, Azka
    Younis, Muhammad Shahzad
    Shafait, Faisal
    DOCUMENT ANALYSIS AND RECOGNITION-ICDAR 2024, PT II, 2024, 14805 : 364 - 379
  • [50] SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
    Hameed, Sufian
    Khan, Hassan Ahmed
    FUTURE INTERNET, 2018, 10 (03)