Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

被引:23
|
作者
Al-Hawawreh, Muna [1 ]
Sitnikova, Elena [1 ]
Aboutorab, Neda [1 ]
机构
[1] Univ New South Wales UNSW, Sch Engn & Informat Technol, Campbell, ACT 2612, Australia
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Ransomware; Industrial Internet of Things; Logic gates; Feature extraction; Data models; Image edge detection; Cryptography; Edge system; IIoT; federated learning; detection; targeted ransomware; INTERNET;
D O I
10.1109/ACCESS.2021.3124634
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Thing (IIoT) systems are considered attractive ransomware targets because they operate critical services that affect human lives and have substantial operational costs. The major concern is with brownfield IIoT systems since they have legacy edge systems that are not fully prepared to integrate with IoT technologies. Various existing security solutions can detect and mitigate such attacks but are often ineffective due to the heterogeneous and distributed nature of the IIoT systems and their interoperability demands. Consequently, developing new detection solutions is essential. Therefore, this paper proposes a novel targeted ransomware detection model tailored for IIoT edge systems. It uses Asynchronous Peer-to-Peer Federated Learning (AP2PFL) and Deep Learning (DL) techniques as a targeted ransomware detection algorithm. The proposed model consists of two modules: 1) Data Purifying Module (DPM) aims to refine and reconstruct a valuable and robust representation of data based on Contractive Denoising Auto-Encoder (CDAE), and 2) Diagnostic and Decision Module (DDM) is used to identify targeted ransomware and its stages based on Deep Neural Network (DNN) and Batch Normalization (BN). The main strengths of this proposed model include: 1) each edge gateway's modules work cooperatively with its neighbors in an asynchronous manner and without a third party, 2) it deals with both homogeneous and heterogeneous data, and 3) it is robust against evasion attacks. An exhaustive set of experiments on three datasets prove the high effectiveness of the proposed model in detecting targeted ransomware (known and unknown attacks) in brownfield IIoT and the superiority over the state-of-the-art models.
引用
收藏
页码:148738 / 148755
页数:18
相关论文
共 50 条
  • [41] A New Global Trust Model based on Recommendation for Peer-To-Peer Network
    Wang, Weijie
    Wang, Xinsheng
    Pan, Shuqin
    Liang, Ping
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 325 - 328
  • [42] A reliable peer-to-peer storage framework based on virtual peers model
    He H.
    International Journal of Networking and Virtual Organisations, 2020, 22 (02) : 129 - 146
  • [43] PBiz: An e-business model based on peer-to-peer network
    Chen, SD
    Wu, ZD
    Zhang, W
    Ma, FY
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 404 - 411
  • [44] Th trust:: Transaction history based peer-to-peer trust model
    Qiao, Shaojie
    Chen, Xingshu
    Tang, Changjie
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 242 - 247
  • [45] Model of Semantic Community Based on Knowledge Map on Peer-to-Peer Networks
    Qin Chunxiu
    Zhao Pengwei
    Dou Yongxiang
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1866 - 1869
  • [46] Reward-based Peer-to-Peer digital cinema distribution model
    Nakaizumi, Takuya
    Sonehara, Noboru
    2006 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI 2006), PROCEEDINGS, 2006, : 942 - +
  • [47] A peer-to-peer information retrieval system based on semantic similarity model
    Zhu, Kun-Peng
    Xu, Zhi-Ming
    Wang, Xiao-Long
    Zhao, Yu-Ming
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 4038 - 4043
  • [48] Immune-based peer-to-peer model for anti-spam
    Wang, Feng
    You, Zhisheng
    Man, Lichun
    COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, PT 3, PROCEEDINGS, 2006, 4115 : 660 - 671
  • [49] A reputation-based trust model for peer-to-peer eCommerce communities
    Xiong, L
    Liu, L
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 275 - 284
  • [50] PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
    Zheng, Yue
    Liu, Wenye
    Gu, Chongyan
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3299 - 3316