Privacy Preservation Using Machine Learning in the Internet of Things

被引:2
|
作者
El-Gendy, Sherif [1 ]
Elsayed, Mahmoud Said [2 ]
Jurcut, Anca [2 ]
Azer, Marianne A. [1 ,3 ]
机构
[1] Nile Univ, Sch Informat Technol & Comp Sci, Cairo 12677, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin D04 C1P1, Ireland
[3] Natl Telecommun Inst, Cairo 12677, Egypt
关键词
internet of things; IoT privacy; machine learning; privacy; malware detection; obfuscated malware; supervised learning algorithms; INTRUSION DETECTION SYSTEMS; DATA AGGREGATION; DIFFERENTIAL PRIVACY; LOGISTIC-REGRESSION; IOT; SECURITY; DEVICES; EDGE; CHALLENGES; MANAGEMENT;
D O I
10.3390/math11163477
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The internet of things (IoT) has prepared the way for a highly linked world, in which everything is interconnected, and information exchange has become more easily accessible via the internet, making it feasible for various applications that enrich the quality of human life. Despite such a potential vision, users' privacy on these IoT devices is a significant concern. IoT devices are subject to threats from hackers and malware due to the explosive expansion of IoT and its use in commerce and critical infrastructures. Malware poses a severe danger to the availability and reliability of IoT devices. If left uncontrolled, it can have profound implications, as IoT devices and smart services can collect personally identifiable information (PII) without the user's knowledge or consent. These devices often transfer their data into the cloud, where they are stored and processed to provide the end users with specific services. However, many IoT devices do not meet the same security criteria as non-IoT devices; most used schemes do not provide privacy and anonymity to legitimate users. Because there are so many IoT devices, so much malware is produced every day, and IoT nodes have so little CPU power, so antivirus cannot shield these networks from infection. Because of this, establishing a secure and private environment can greatly benefit from having a system for detecting malware in IoT devices. In this paper, we will analyze studies that have used ML as an approach to solve IoT privacy challenges, and also investigate the advantages and drawbacks of leveraging data in ML-based IoT privacy approaches. Our focus is on using ML models for detecting malware in IoT devices, specifically spyware, ransomware, and Trojan horse malware. We propose using ML techniques as a solution for privacy attack detection and test pattern generation in the IoT. The ML model can be trained to predict behavioral architecture. We discuss our experiments and evaluation using the "MalMemAnalysis" datasets, which focus on simulating real-world privacy-related obfuscated malware. We simulate several ML algorithms to prove their capabilities in detecting malicious attacks against privacy. The experimental analysis showcases the high accuracy and effectiveness of the proposed approach in detecting obfuscated and concealed malware, outperforming state-of-the-art methods by 99.50%, and would be helpful in safeguarding an IoT network from malware. Experimental analysis and results are provided in detail.
引用
收藏
页数:35
相关论文
共 50 条
  • [41] Securing internet of things using machine and deep learning methods: a survey
    Ghaffari, Ali
    Jelodari, Nasim
    Pouralish, Samira
    Derakhshanfard, Nahide
    Arasteh, Bahman
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9065 - 9089
  • [42] A node pairing approach to secure the Internet of Things using machine learning
    Ahmad, Usman
    [J]. Journal of Computational Science, 2022, 62
  • [43] Classification of Agriculture Farm Machinery Using Machine Learning and Internet of Things
    Waleed, Muhammad
    Um, Tai-Won
    Kamal, Tariq
    Usman, Syed Muhammad
    [J]. SYMMETRY-BASEL, 2021, 13 (03): : 1 - 16
  • [44] Ransomware Attack Detection on the Internet of Things Using Machine Learning Algorithm
    Zewdie, Temechu Girma
    Girma, Anteneh
    Cotae, Paul
    [J]. HCI INTERNATIONAL 2022 - LATE BREAKING PAPERS: INTERACTING WITH EXTENDED REALITY AND ARTIFICIAL INTELLIGENCE, 2022, 13518 : 598 - 613
  • [45] Regional Inundation Forecasting Using Machine Learning Techniques with the Internet of Things
    Yang, Shun-Nien
    Chang, Li-Chiu
    [J]. WATER, 2020, 12 (06)
  • [46] A node pairing approach to secure the Internet of Things using machine learning
    Ahmad, Usman
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2022, 62
  • [47] Agriculture Field Automation and Digitization Using Internet of Things and Machine Learning
    Choudhury, Sushabhan
    Singh, Rajesh
    Gehlot, Anita
    Kuchhal, Piyush
    Akram, Shaik Vaseem
    Priyadarshi, Neeraj
    Khan, Baseem
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [48] Advancements in Intrusion Detection Systems for Internet of Things Using Machine Learning
    Ul Haq, Shahid
    Abbas, Ash Mohammad
    [J]. 2022 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2022,
  • [49] Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics
    Oser, Pascal
    Kargl, Frank
    Luders, Stefan
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 417 - 427
  • [50] Survivability of industrial internet of things using machine learning and smart contracts
    Priyadarshini, Ishaani
    Kumar, Raghvendra
    Alkhayyat, Ahmed
    Sharma, Rohit
    Yadav, Kusum
    Alkwai, Lulwah M.
    Kumar, Sachin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 107