Sunteți pe pagina 1din 6

AD-IoT: Anomaly Detection of IoT Cyberattacks 1n

Smart City Using Machine Leaming


Ibrahim Alrashdi Ali Alqazzaz Esam Aloufi
Engineering and Computer Science Engineering and Computer Science Engineering and Computer Science
Oakland University Oakland University Oakland University
Rochester, USA Rochester, USA Rochester, USA
iralrashdi@oakland.edu aalqazzaz@oakland.edu aloufi@oakland.edu

Raed Alharthi Mohamed Zohdy Hua Ming


Engineering and Computer Science Engineering and Computer Science Engineering and Computer Science
Oakland University Oakland University Oakland University
Rochester, USA Rochester, USA Rochester, Michigan, USA
rsalharthi@oakland.edu zohdyma@oakland.edu ming@oakland.edu

Abstract-In recent years, the wide adoption of the modern unauthorized access to the loT devices without the knowledge
Internet of Things (IoT) paradigm has led to the invention of of either the eligible user or administrator (e.g. Miria botnet)
smart cities. Smart cities operate in real-world time to promote [5].
ease and quality of life in urban cities. The network traffic
of a smart city via loT systems is growing exponentially and There are two main security challenges in smart city appli­
introducing new cybersecurity challenges since these loT devices cations. The first challenge is how to detect zero-day attacks
are being connected to sensors that are directly connected to as they happen from a variety of protocols of loT devices in
massive cloud servers. In order to mitigate these cyberattacks, the a smart city's cloud data center, assuming that the enormous
developers need to enhance new techniques for detecting infected attacks are hidden in IoT devices. The second one is how to
loT devices. In this paper, to address the loT cybersecurity
threats in a smart city, we propose an Anomaly Detection­ find a method to intelligently detect cyberattacks [5] (e.g. IoT
loT (AD-IoT) system, which is an intelligent anomaly detection malware attacks, etc.) from the IoT networks before damaging
based on Random Forest machine learning algorithm. The a smart city. Most loT sensors are currently gathering all of
proposed solution can effectively detect compromised loT devices the information passing through the massive amount of data to
at distributed fog nodes. To evaluate our model, we utilized be detected in cloud servers. Currently, traditional IDS [6] is
modern dataset to illustrate the model's accuracy. Our findings
show that the AD-loT can effectively achieve highest classification not designed for IoT network devices, as these devices have
accuracy of 99.34% with lowest false positive rate. limited resources and less functionality (e.g. smart watches,
Keywords-Internet of Things (IoT), smart city, Network based smart lamps, smart locks, etc.).
IDS (NIDS), Random Forest, fog layer, IoT botnet, cybersecurity. Fog computing is recently designed between cloud and loT
layers to reduce energy consumption, storage, and latency.
I. INTRODUCTION Moreover, it aims at moving the computing process near
In recent years, the proliferation of Internet of Things (IoT) the sensors to quickly respond to the IoT applications in a
has been widely increasing in societies throughout the world. wide area, such as a smart city [7], [8]. Recently, authors
The number of connected loT devices had already reached in [9] suggest enhancing the detection of loT cyberattack in
27 billion in 2017, and these IoT devices will exponentially the distributed fog layer. The detection in the loT networks
increase on demand of markets, so the potential has been would be more significant to automatically alert the Internet
expected to reach approximately 125 billion in 2030 [1]. Service Providers (ISPs) or administrators, when quickly and
Various smart city applications connect enormous loT de­ effectively detecting compromised loT devices in the fog layer
vices to real-world objects, which indeed have very important and interrupt the connection of the IoT attacks from the
benefits to urban life [2]. However, the massive number of network of urban life.
loT devices over heterogeneous variety types of services, In this paper, we propose the AD-IoT system which uses
technologies, devices, and protocols (e.g. Wireless, Wired, an intelligent anomaly detection method based on machine
Satellite, Cellular, Bluetooth, etc.) leads to the complexity of learning algorithms that can detect attacks with reducing the
managing future IoT networks [3], [4]. Therefore, these inte­ false positive rate. The AD-IoT system is also designed to
gration protocols with the internet leaves serious cybersecurity monitor all IoT traffic in a distributed fog layer and alert
threats and vulnerabilities for attacking the information of the the administrator or the provider services in a smart city.
daily activities of citizen's lives. These cyberthreats can obtain This approach can detect a challenge of hidden compromised

978-1-7281-0554-3/19/$31.00 ©2019 IEEE

0305
machine learning model and not yet account for urban life [11] M. M. Hossain, M. Fotouhi, and R. Hasan, "Towards an analysis of
network designs. security issues, challenges, and open problems in the internet of things,"
in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015,
We plan to continue developing the final model with more pp. 21-28.
classification algorithms such as Conventional Neural Network [12] H. Habibzadeh, T. Soyata, B. Kantarci, A. Boukerche, and C. Kaptan,
(CNN), etc., to the proposed design AD-IoT system for IoT "Sensing, communication and security planes: A new challenge for a
smart city system design r," Computer Networks, vol. 144, pp. 163-
devices in a smart city. This work plan would lead to train final 200, 2018.
model parallel distributed among fog nodes and centralized the [13] N. Moustafa and J. Slay, "Unsw-nb15: a comprehensive data set for
IDS in a master fog node to detect cyberattaks and identify network intrusion detection systems (unsw-nb15 network data set)," in
Military Communications and Information Systems Conference (Mil­
normal or attack traffic activities in urban life. Furthermore, CIS), 2015. IEEE, 2015, pp. 1-6.
this work tests only the proposed preliminary model to classify [14] N. Koroniotis, N. Moustafa, E. Sitnikova, and J. Slay, "Towards develop­
the network traffic, and thereafter we will continue to distribute ing network forensic mechanism for botnet activities in the iot based on
machine learning techniques," in Mobile Networks and Management:
IDS and compare the final model based on fog network 9th International Conference, MONAMI 2017, Melbourne, Australia,
detection systems. To achieve our goal for detecting IoT attack December 13-15, 2017, Proceedings, vol. 235. Springer, 2018, pp.
networks in a smart city, we also plan to use open sources of 30--44.
[15] M. Nobakht, V. Sivaraman, and R. Boreli, "A host-based intrusion
distributed computing (e.g. Apache Spark, etc.) to distribute detection and mitigation framework for smart home iot using openflow,"
the model in fog nodes for detecting the cyberattacks and in Availability, Reliability and Security (ARES), 2016 11th International
handle huge amount of data passing through the final model Conference on. IEEE, 2016, pp. 147-156.
[16] D. H. Summerville, K. M. Zach, and Y. Chen, "Ultra-lightweight deep
detection. Therefore, the beyond-work goal is to use n-fold packet anomaly detection for internet of things devices;' in Computing
cross validation to evaluate the performance metrics of the and Communications Conference (IPCCC), 2015 IEEE 34th Interna­
design AD-IoT system to increase the effective detection rates, tional Performance. IEEE, 2015, pp. 1-8.
[17] S. Raza, L. Wallgren, and T. Voigt, "Svelte: Real-time intrusion detection
and reduce overfitting and false positive rates. in the internet of things," Ad hoc networks, vol. 11, no. 8, pp. 2661-
2674, 2013.
VIII. CONCLUSION [18] S. Garg, K. Kaur, N. Kumar, S. Batra, and M. S. Obaidat, "Hyclass: Hy­
The vision of a smart city security detection system is brid classification model for anomaly detection in cloud environment," in
2018 IEEE International Conference on Communications (ICC). IEEE,
studied in this paper as efficiently enhancing a traditional 2018, pp. 1-7.
IDS for smart city's loT applications. We introduced an [19] M. Tavallaee, N. Stakhanova, and A. A. Ghorbani, "Toward credible
approach based on NIDS called AD-IoT system to detect evaluation of anomaly-based intrusion-detection methods;' IEEE Trans­
actions on Systems, Man, and Cybernetics, Part C (Applications and
various loT attacks in a distributed fog layer instead of a cloud Reviews), vol. 40, no. 5, pp. 516-524, 2010.
layer. The proposed AD-IoT can significantly detect malicious [20] M. Ahmed, A. N. Mahmood, and J. Hu, "A survey of network anomaly
behavior using anomalies based on machine learning through detection techniques," Journal of Network and Computer Applications,
vol. 60, pp. 19-31, 2016.
the evaluation of the UNSW-NB 15 dataset to detect the binary [21] S. Prabavathy, K. Sundarakantham, and S. M. Shalinie, "Design of
labeled classification before distributing on fog nodes. cognitive fog computing for intrusion detection in internet of things,"
Journal of Communications and Networks, vol. 20, no. 3, pp. 291-298,
REFERENCES 2018.
[l] J. Howell. Number of connected iot devices will surge to 125 [22] D. Oh, D. Kim, and W.W. Ro, "A malicious pattern detection engine for
billion by 2030, ihs markit says - ihs technology. [Online]. Available: embedded security systems in the internet of things," Sensors, vol. 14,
https://technology.ihs.com/596542/, last accessed: 11/07/2018. no. 12, pp. 24 188-24 211, 2014.
[2] E. Borgia, "The internet of things vision: Key features, applications and [23] N. Moustafa and J. Slay, "The evaluation of network anomaly detection
open issues," Computer Communications, vol. 54, pp. 1-31, 2014. systems: Statistical analysis of the unsw-nb15 data set and the compar­
[3] F. Restuccia, S. D'Oro, and T. Melodia, "Securing the internet of things: ison with the kdd99 data set," Information Security Journal: A Global
New perspectives and research challenges," IEEE Internet of Things Perspective, vol. 25, no. 1-3, pp. 18-31, 2016.
Journal, vol. 1, no. 1, pp. 1-14, 2018. [24] M. M. Rathore, A. Paul, A. Ahmad, N. Chilarnkurti, W.-H. Hong, and
[4] J. A. Stankovic, "Research directions for the internet of things," IEEE H. Seo, "Real-time secure communication for smart city in high-speed
Internet of Things Journal, vol. 1, no. 1, pp. 3-9, 2014. big data environment," Future Generation Computer Systems, vol. 83,
[5] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, pp. 638-652, 2018.
J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis [25] J. Zhang, M. Zulkernine, and A. Haque, "Random-forests-based network
et al., "Understanding the mirai botnet;' in USENIX Security Symposium, intrusion detection systems," IEEE Transactions on Systems, Man, and
2017, pp. 1092-1110. Cybernetics, Part C (Applications and Reviews), vol. 38, no. 5, pp. 649-
[6] B. B. Zarpelao, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, "A 659, 2008.
survey of intrusion detection in internet of things;' Journal of Network [26] K. Angrishi, "Turning internet of things (iot) into internet of vulnera­
and Computer Applications, vol. 84, pp. 25-37, 2017. bilities (iov): lot botnets," arXiv preprint arXiv:1702.03681, 2017.
[7] J. Santos, P. Leroux, T. Wauters, B. Volckaert, and F. D. Turck, [27] A. Alqazzaz, I. Alrashdi, E. Aloufi, M. Zohdy, and H. Ming, "Secsps:
"Anomaly detection for smart city applications over 5g low power wide A secure and privacy-preserving framework for smart parking systems,"
area networks," in NOMS 2018 - 2018 IEEE/IFIP Network Operations Journal of Information Security, vol. 9, no. 04, pp. 299-314, 2018.
and Management Symposium, 2018, pp. 1-9. [28] B. Schneierl. Security econmics of the internet of things,. [Online].
[8] A. Yousefpour, G. Ishigaki, and J. P. Jue, "Fog computing: Towards Available: https://bit.ly/20BuxBE
minimizing delay in the internet of things," in Edge Computing (EDGE), [29] S. Learn. scikit-learn machine learning in python. [Online]. Available:
2017 IEEE International Conference on. IEEE, 2017, pp. 17-24. https://scikit-learn.org/stable/
[9] A. Abeshu and N. Chilarnkurti, "Deep learning: the frontier for dis­ [30] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho,
tributed attack detection in fog-to-things computing," IEEE Communi­ "Deep learning approach for network intrusion detection in software
cations Magazine, vol. 56, no. 2, pp. 169-175, 2018. defined networking," in Wireless Networks and Mobile Communications
[10] R. Roman, J. Zhou, and J. Lopez, "On the features and challenges (WINCOM), 2016 International Conference on. IEEE, 2016, pp. 258-
of security and privacy in distributed internet of things," Computer 263.
Networks, vol. 57, no. 10, pp. 2266-2279, 2013.

0310

S-ar putea să vă placă și