Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

被引:23
|
作者
Al-Hawawreh, Muna [1 ]
Sitnikova, Elena [1 ]
Aboutorab, Neda [1 ]
机构
[1] Univ New South Wales UNSW, Sch Engn & Informat Technol, Campbell, ACT 2612, Australia
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Ransomware; Industrial Internet of Things; Logic gates; Feature extraction; Data models; Image edge detection; Cryptography; Edge system; IIoT; federated learning; detection; targeted ransomware; INTERNET;
D O I
10.1109/ACCESS.2021.3124634
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Thing (IIoT) systems are considered attractive ransomware targets because they operate critical services that affect human lives and have substantial operational costs. The major concern is with brownfield IIoT systems since they have legacy edge systems that are not fully prepared to integrate with IoT technologies. Various existing security solutions can detect and mitigate such attacks but are often ineffective due to the heterogeneous and distributed nature of the IIoT systems and their interoperability demands. Consequently, developing new detection solutions is essential. Therefore, this paper proposes a novel targeted ransomware detection model tailored for IIoT edge systems. It uses Asynchronous Peer-to-Peer Federated Learning (AP2PFL) and Deep Learning (DL) techniques as a targeted ransomware detection algorithm. The proposed model consists of two modules: 1) Data Purifying Module (DPM) aims to refine and reconstruct a valuable and robust representation of data based on Contractive Denoising Auto-Encoder (CDAE), and 2) Diagnostic and Decision Module (DDM) is used to identify targeted ransomware and its stages based on Deep Neural Network (DNN) and Batch Normalization (BN). The main strengths of this proposed model include: 1) each edge gateway's modules work cooperatively with its neighbors in an asynchronous manner and without a third party, 2) it deals with both homogeneous and heterogeneous data, and 3) it is robust against evasion attacks. An exhaustive set of experiments on three datasets prove the high effectiveness of the proposed model in detecting targeted ransomware (known and unknown attacks) in brownfield IIoT and the superiority over the state-of-the-art models.
引用
收藏
页码:148738 / 148755
页数:18
相关论文
共 50 条
  • [21] Proactive Content Caching for Internet-of-Vehicles based on Peer-to-Peer Federated Learning
    Yu, Zhengxin
    Hu, Jia
    Min, Geyong
    Xu, Han
    Mills, Jed
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 601 - 608
  • [22] Capability-Based Information Flow Control Model in the IoT
    Nakamura, Shigenari
    Enokido, Tomoya
    Barolli, Leonard
    Takizawa, Makoto
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 63 - 71
  • [23] A Task-Based Model for the Lifespan of Peer-to-Peer Swarms
    Zhao, Yong
    Zhang, Zhibin
    He, Ting
    Liu, Alex X.
    Guo, Li
    Fang, Binxing
    NETWORKING 2012, PT II, 2012, 7290 : 71 - 83
  • [24] A group-based trust model in peer-to-peer environment
    Xu, Fen
    Guo, Yajun
    Wang, Qin
    INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 1, 2007, 251 : 44 - +
  • [25] A group-based trust model in Peer-To-Peer environment
    Xu, Fen
    Guo, Yajun
    Wang, Qin
    IFIP Advances in Information and Communication Technology, 2007, 251 : 44 - 50
  • [26] Distributed cloud bursting model based on peer-to-peer overlay
    Zhygmanovskyi, Andrii
    Yoshida, Norihiko
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 823 - 828
  • [27] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129
  • [28] A Community-Based Peer-to-Peer Model Based on Social Networks
    Modarresi, Amir
    Mamat, Ali
    Ibrahim, Hamidah
    Mustapha, Norwati
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 272 - 277
  • [29] A Domain-Based Trust Model in Peer-to-Peer Environment
    Xu, Fen
    Guo, Yajun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01) : 15 - 15
  • [30] A novel behavior-based peer-to-peer trust model
    Wang, T
    Lu, XL
    Duan, HC
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 947 - 952