Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

被引:23
|
作者
Al-Hawawreh, Muna [1 ]
Sitnikova, Elena [1 ]
Aboutorab, Neda [1 ]
机构
[1] Univ New South Wales UNSW, Sch Engn & Informat Technol, Campbell, ACT 2612, Australia
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Ransomware; Industrial Internet of Things; Logic gates; Feature extraction; Data models; Image edge detection; Cryptography; Edge system; IIoT; federated learning; detection; targeted ransomware; INTERNET;
D O I
10.1109/ACCESS.2021.3124634
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Thing (IIoT) systems are considered attractive ransomware targets because they operate critical services that affect human lives and have substantial operational costs. The major concern is with brownfield IIoT systems since they have legacy edge systems that are not fully prepared to integrate with IoT technologies. Various existing security solutions can detect and mitigate such attacks but are often ineffective due to the heterogeneous and distributed nature of the IIoT systems and their interoperability demands. Consequently, developing new detection solutions is essential. Therefore, this paper proposes a novel targeted ransomware detection model tailored for IIoT edge systems. It uses Asynchronous Peer-to-Peer Federated Learning (AP2PFL) and Deep Learning (DL) techniques as a targeted ransomware detection algorithm. The proposed model consists of two modules: 1) Data Purifying Module (DPM) aims to refine and reconstruct a valuable and robust representation of data based on Contractive Denoising Auto-Encoder (CDAE), and 2) Diagnostic and Decision Module (DDM) is used to identify targeted ransomware and its stages based on Deep Neural Network (DNN) and Batch Normalization (BN). The main strengths of this proposed model include: 1) each edge gateway's modules work cooperatively with its neighbors in an asynchronous manner and without a third party, 2) it deals with both homogeneous and heterogeneous data, and 3) it is robust against evasion attacks. An exhaustive set of experiments on three datasets prove the high effectiveness of the proposed model in detecting targeted ransomware (known and unknown attacks) in brownfield IIoT and the superiority over the state-of-the-art models.
引用
收藏
页码:148738 / 148755
页数:18
相关论文
共 50 条
  • [1] Collaborative IoT learning with secure peer-to-peer federated approach
    Hijazi, Neveen Mohammad
    Aloqaily, Moayad
    Guizani, Mohsen
    COMPUTER COMMUNICATIONS, 2024, 228
  • [2] Peer-to-Peer Federated Learning based Anomaly Detection for Open Radio Access Networks
    Attanayaka, Dinaj
    Porambage, Pawani
    Liyanage, Madhusanka
    Ylianttila, Mika
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 5464 - 5470
  • [3] Towards a Sustainable Blockchain: A Peer-to-Peer Federated Learning based Approach
    Agarwal, Vidushi
    Mishra, Shruti
    Pal, Sujata
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2024, 24 (04)
  • [4] Peer-to-Peer Federated Learning for COVID-19 Detection Using Transformers
    Chetoui, Mohamed
    Akhloufi, Moulay A. A.
    COMPUTERS, 2023, 12 (05)
  • [5] Federated Document Search Using Hybrid Peer-to-peer Network for Plagiarism Detection
    Priambodo, Widyanto Bagus
    Guarddin, Gladhi
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2016, : 61 - 66
  • [6] Peer-To-Peer traffic detection based on periodic sampling
    Yu, FuXing
    Suo, YiNa
    Song, DingLi
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [7] Global state detection based on peer-to-peer interactions
    Chandra, P
    Kshemkalyani, AD
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 560 - 571
  • [8] Peer-to-Peer Based Intrusion Detection Modeling and Analysis
    Zhang Xiaosong
    Chen Ting
    Ma Yue
    Li Hua
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 213 - +
  • [9] Global state detection based on peer-to-peer interactions
    Chandra, P. (pchandra@cs.uic.edu), (Springer Verlag):
  • [10] Efficient Peer-to-Peer E-Payment Based on Asynchronous Dual Blockchain
    Hong, Wei-Chih
    Chen, Ying-Chin
    Yang, Ren-Kai
    Li, Bo
    Lee, Jung-San
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1375 - 1385