Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks

被引:19
|
作者
Salim, Mikail Mohammed [1 ]
Singh, Sushil Kumar [1 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, SeoulTech, Seoul 01811, South Korea
关键词
Botnet; Soft computing; LSTM; Internet of Things; Smart City; FRAMEWORK; INTERNET; SYSTEM;
D O I
10.1016/j.asoc.2021.107859
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart Cities contains millions of IoT sensors supporting critical applications such as Smart Transport, Buildings, Intelligent Vehicles, and Logistics. A central administrator appointed by the government manages and maintains the security of each node. Smart City relies upon millions of sensors that are heterogeneous and do not support standard security architecture. Different manufacturers have weak protection protocols for their products and do not update their firmware upon newly identified operating systems' vulnerabilities. Adversaries using brute force methods exploit the lack of inbuilt security systems on IoT devices to grow their bot network. Smart cities require a standard framework combining soft computing and Deep Learning (DL) for device fleet management and complete control of sensor operating systems for absolute security. This paper presents a real-world application for IoT fleet management security using a lightweight container-based botnet detection (C-BotDet) framework. Using a three-phase approach, the framework using Artificial Intelligence detects compromised IoT devices sending malicious traffic on the network. Balena Cloud revokes API keys and prevents a compromised device from infecting other devices to form a more giant botnet. VPN (Virtual Private Network) prevents inter-device communication and routes all malicious traffic through an external server. The framework quickly updates the standard Linux-based operating system IoT device fleet without relying on different manufacturers to update their system security individually. The simulation and analysis of the C-BotDet framework are presented in a practical working environment to demonstrate its implementation feasibility. (C) 2021 Published by Elsevier B.V.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Securing web applications against XSS and SQLi attacks using a novel deep learning approach
    Tadhani, Jaydeep R.
    Vekariya, Vipul
    Sorathiya, Vishal
    Alshathri, Samah
    El-Shafai, Walid
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [42] Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
    Shrivastava, Rajesh Kumar
    Singh, Simar Preet
    Hasan, Mohammad Kamrul
    Gagandeep
    Islam, Shayla
    Abdullah, Salwani
    Aman, Azana Hafizah Mohd
    [J]. COMPUTER COMMUNICATIONS, 2022, 193 : 38 - 46
  • [43] Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
    Rizvi, Syed
    Imler, Jarrett
    Ritchey, Luke
    Tokar, Michael
    [J]. 2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [44] Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 690 - 702
  • [45] Securing palm-vein sensors against presentation attacks using image noise residuals
    Bhilare, Shruti
    Kanhangad, Vivek
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (05)
  • [46] Securing the IoT System of Smart City against Cyber Threats Using Deep Learning
    Saba, Tanzila
    Khan, Amjad Rehman
    Sadad, Tariq
    Hong, Seng-phil
    [J]. DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2022, 2022
  • [47] Developing an Integrated Framework for Securing Internet of Things Traffic in Smart Cities Using Machine Learning Techniques
    Alhanaya, Moody
    Al-Shqeerat, Khalil
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (16):
  • [48] Centralized defense using smart routing against link-flooding Attacks
    Belabed, Dallal
    Bouet, Mathieu
    Conan, Vania
    [J]. 2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [49] Using labeling to prevent cross-service attacks against smart phones
    Mulliner, Collin
    Vigna, Giovanni
    Dagon, David
    Lee, Wenke
    [J]. DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 91 - 108
  • [50] Protecting Critical Buses in Power-Grid Against Data Attacks: Adaptive Protection Schemes for Smart Cities
    Wickramaarachchi, Charith
    Chelmis, Charalampos
    Kannan, Rajgopal
    Prasanna, Viktor K.
    [J]. PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), 2016, : 1047 - 1056