An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments

被引:0
|
作者
Niu, Tong [1 ]
Liu, Yaqiu [1 ]
Li, Qingfeng [2 ]
Bao, Qichi [1 ]
机构
[1] Northeast Forestry Univ, State Coll Comp & Control Engn, Harbin 150000, Peoples R China
[2] Northeast Forestry Univ, Network Informat Ctr, Harbin 150000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Data models; Computational modeling; Servers; Accuracy; Training; Image edge detection; Feature extraction; Data privacy; Telecommunication traffic; Blockchains; Blockchain; malicious traffic detection; Docker; INTERNET;
D O I
10.1109/ACCESS.2024.3481496
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to evolve, its inherent diversity and rapid iteration pose challenges for the development and deployment of malicious traffic detection systems. This study aims to develop a scalable detection architecture that can accurately identify malicious traffic in IoT environments, while protecting user privacy. We propose a deep-learning-based model that is capable of training and updating within an IoT setting. The payload of the data packets is encoded to enhance the feature extraction capability of the model. The model is then trained using federated learning/edge computing to ensure data privacy. The final model parameters are stored in an IPFS file storage system with the corresponding hash value stored in the blockchain, ensuring the correctness of the model parameters during expansion. Experiments were conducted in a Docker environment using the CIC IoT Dataset 2022 and CIC IoT Dataset 2023. The results demonstrate that the proposed architecture achieves a pre-training accuracy of 98.6% for known abnormal traffic and 79% for unknown malicious traffic. After a few rounds of training, the accuracies improved to 99.5% and 89.4%. The model also exhibited robust performance during expansion.
引用
收藏
页码:191010 / 191019
页数:10
相关论文
共 50 条
  • [21] Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT
    Chen, Dajiang
    Wang, Hao
    Zhang, Ning
    Nie, Xuyun
    Dai, Hong-Ning
    Zhang, Kuan
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17265 - 17279
  • [22] Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers
    Trivedi, Hiral S.
    Patel, Sankita J.
    WIRELESS NETWORKS, 2023, 29 (03) : 1385 - 1409
  • [23] Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers
    Hiral S. Trivedi
    Sankita J. Patel
    Wireless Networks, 2023, 29 : 1385 - 1409
  • [24] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Zheng, Bao-Kun
    Zhu, Lie-Huang
    Shen, Meng
    Gao, Feng
    Zhang, Chuan
    Li, Yan-Dong
    Yang, Jing
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 557 - 567
  • [25] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Bao-Kun Zheng
    Lie-Huang Zhu
    Meng Shen
    Feng Gao
    Chuan Zhang
    Yan-Dong Li
    Jing Yang
    Journal of Computer Science and Technology, 2018, 33 : 557 - 567
  • [26] A Privacy-Preserving Iot-Based Fire Detector
    Altowaijri, Abdullah H.
    Alfaifi, Mohammed S.
    Alshawi, Tariq A.
    Ibrahim, Ahmed B.
    Alshebeili, Saleh A.
    IEEE ACCESS, 2021, 9 : 51393 - 51402
  • [27] Privacy-Preserving Model of IoT Based Trust Evaluation
    Chen, Zhenguo
    Tian, Liqin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (02): : 371 - 374
  • [28] Privacy-Preserving and Scalable Affect Detection in Online Synchronous Learning
    Bottger, Felix
    Cetinkaya, Ufuk
    Di Mitri, Daniele
    Gombert, Sebastian
    Shingjergji, Krist
    Iren, Deniz
    Klemke, Roland
    EDUCATING FOR A NEW FUTURE: MAKING SENSE OF TECHNOLOGY-ENHANCED LEARNING ADOPTION, EC-TEL 2022, 2022, 13450 : 45 - 58
  • [29] Privacy-Preserving Neural Architecture Search Across Federated IoT Devices
    Zhang, Chunhui
    Yuan, Xiaoming
    Zhang, Qianyun
    Zhu, Guangxu
    Cheng, Lei
    Zhang, Ning
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1434 - 1438
  • [30] MTSecurity: Privacy-Preserving Malicious Traffic Classification Using Graph Neural Network and Transformer
    Yang, Jin
    Jiang, Xinyun
    Lei, Yulin
    Liang, Weiheng
    Ma, Zicheng
    Li, Siyu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 3583 - 3597