On-device context-aware misuse detection framework for heterogeneous IoT edge

被引:3
|
作者
Nitish, A. [1 ]
Hanumanthappa, J. [1 ]
Prakash, Shiva S. P. [2 ]
Krinkin, Kirill [3 ]
机构
[1] Univ Mysore, Dept Studies Comp Sci, Mysuru 570006, Karnataka, India
[2] JSS Sci & Technol Univ, Dept Informat Sci & Engn, JSS Tech Inst Campus, Mysuru 570006, Karnataka, India
[3] St Petersburg Electrotech Univ LETI, Dept Software Engn & Comp Applicat, Ulitsa Prof Popova 5, St Petersburg 197022, Russia
关键词
Botnet-based attacks; Context-awareness; Expert knowledge correlation; Heterogeneous IoT edge; On-device misuse intrusion detection; Root cause analysis; Threat intensity compounding; Threat localization; INTRUSION DETECTION; INTERNET; THINGS; ATTACKS; SYSTEM;
D O I
10.1007/s10489-022-04039-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional AI techniques for offline misuse network intrusion detection have performed well, assuming that the traffic from the datasets is sufficiently large for generalization, balanced, independently and identically distributed-exhibiting homogeneous behavior with little to no context change. However, the rapidly expanding IoT network is an ensemble of proliferating internet-connected devices catering to the growing need for handling highly distributed, heterogeneous, and time-critical workloads that conform to none of the above assumptions. Moreover, the evolving Botnet-based attack vectors exploit the non-standardized and poorly scrutinized architectural vulnerabilities of such devices-leading to compounding threat intensity, rapidly rendering the network defenseless. Furthermore, the memory, processor, and energy resource constraints of the IoT devices necessitate lightweight device-specific intrusion detection policies for effective and updated rule learning in real-time through the edge infrastructures. However, the existing methods proposed to solve such issues are either centralized, data and resource-intensive, context-unaware, or inefficient for online rule learning with smaller and imbalanced data samples. Thus, this paper addresses such issues through a context-aware expert system-based feature subset framework with minimal processing overhead and a decentralized on-device misuse detection scheme for IoT-called HetIoT-NIDS, capable of efficiently inferring over smaller data samples, tolerant to class imbalance, and deployable on the low-memory and low-power edge of IoT devices. Furthermore, HetIoT-NIDS facilitates threat localization within the deployed device, preventing threat progression and intensity compounding. The experiments and analyses of the propounded algorithms and the resulting training times and model sizes prove that the proposed approach is efficient and adaptable to online and offline misuse intrusion detection, especially on smaller data sample sizes.
引用
收藏
页码:14792 / 14818
页数:27
相关论文
共 50 条
  • [21] Service-Oriented IoT Resources Access and Provisioning Framework for IoT Context-Aware Environment
    Zhao, Liqing
    Cheng, Bo
    Chen, Junliang
    2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2020, : 245 - 251
  • [22] LCANet: Lightweight Context-Aware Attention Networks for Earthquake Detection and Phase-Picking on IoT Edge Devices
    Zhao, Yu
    Deng, Pan
    Liu, Junting
    Wang, Mulan
    Wan, Jiafu
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4024 - 4035
  • [23] A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications
    Li, Wei
    Song, Tianyi
    Li, Yingshu
    Ma, Liran
    Yu, Jiguo
    Cheng, Xiuzhen
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 176 - 177
  • [24] SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT
    Ghosh, Nirnay
    Chandra, Saket
    Sachidananda, Vinay
    Elovici, Yuval
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10773 - 10785
  • [25] Explainable context-aware IoT framework using human digital twin for healthcare
    Vats, Tarun
    Singh, Sunil K.
    Kumar, Sudhakar
    Gupta, Brij B.
    Gill, Shabeg Singh
    Arya, Varsha
    Alhalabi, Wadee
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (22) : 62489 - 62490
  • [26] A context-aware encryption protocol suite for edge computing-based IoT devices
    Zaineb Dar
    Adnan Ahmad
    Farrukh Aslam Khan
    Furkh Zeshan
    Razi Iqbal
    Hafiz Husnain Raza Sherazi
    Ali Kashif Bashir
    The Journal of Supercomputing, 2020, 76 : 2548 - 2567
  • [27] A Modular Approach to Context-Aware IoT Applications
    Venkatesh, Jagannathan
    Chan, Christine
    Akyurek, Alper Sinan
    Rosing, Tajana Simunic
    PROCEEDINGS 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION IOTDI 2016, 2016, : 235 - 240
  • [28] A context-aware encryption protocol suite for edge computing-based IoT devices
    Dar, Zaineb
    Ahmad, Adnan
    Khan, Farrukh Aslam
    Zeshan, Furkh
    Iqbal, Razi
    Sherazi, Hafiz Husnain Raza
    Bashir, Ali Kashif
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 2548 - 2567
  • [29] Personalized Context-Aware Authentication Protocols in IoT
    Bulat, Radoslaw
    Ogiela, Marek R.
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [30] Context-Aware Distribution In Constrained IoT Environments
    Eyckerman, Reinout
    Sharif, Muddsair
    Mercelis, Siegfried
    Hellinckx, Peter
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 437 - 446