Enhancing Industrial Security with IoT-based Passive Intrusion Detection and Segmentation

Authors

DOI:

https://doi.org/10.56294/sctconf2024934

Keywords:

Convolutional Neural Networks (CNN), IoT, Recurrent Neural Networks (RNN), Passive (ID) Intrusion Detection

Abstract

Introduction: passive intrusion detection in industrial environments can be challenging, especially when the area being monitored is vast. However, with the advent of IoT technology, it is possible to deploy sensors and devices that can help with mass segmentation of passive intrusion. Hence, this approach deploys ML (Machine Learning) algorithm as improvised (Convolutional Neural Network) CNN support for identifying and avoid illegal access to critical areas in real time, ultimately improving security and safety in industrial environments.

Methods: in turn the proposed algorithm can detect patterns and anomalies that could indicate a passive intrusion. In order to discover the patterns and connections between the various sensor data points, DL (Deep Learning) techniques like CNNs, Recurrent Neural Networks (RNNs), and Autoencoders (AE) may be trained on massive datasets of sensor data.

Results: then, the robust technique DL (Deep Learning) can be utilized for ID (Intrusion Detection) the industrialized settings, when specifically combined with other IoT devices like sensors and alert systems. Thus, the model is trained and tested. Finally, it achieved 98,51 % and 94,85 % accuracy accordingly.

Conclusion: these frameworks after the completing training phase can be employed for the novel sensor data’s actual analysis and also for the anomalies detection as it reveals a potential ID.

References

1. Atzori L, Iera A, and Morabito G. The internet of things: A survey. Computer networks, 54(15), pp. 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010.

2. Weber RH. Internet of Things–New security and privacy challenges. Computer law & security review, 26(1), pp. 23-30. https://doi.org/10.1016/j.clsr.2009.11.008.

3. Miorandi D, Sicari S, De Pellegrini F, and Chlamtac I. Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), pp. 1497-1516. https://doi.org/10.1016/j.adhoc.2012.02.016.

4. Zhao K, and Ge L. A survey on the internet of things security. In Ninth international conference on computational intelligence and security, pp. 663-667. https://doi.org/10.1109/CIS.2013.145.

5. Ziegeldorf JH, Morchon OG, and Wehrle K. Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), pp. 2728-2742. https://doi.org/10.1002/sec.795.

6. Fremantle P, and Scott P. A security survey of middleware for the Internet of Things. PeerJ PrePrints, 3, pp. 1-22. https://dx.doi.org/10.7287/peerj.preprints.1241v1.

7. Görmüş S, Aydın H, and Ulutaş G. Security for the internet of things: a survey of existing mechanisms, protocols and open research issues. Journal of the Faculty of Engineering and Architecture of Gazi University, 33(4), pp. 1247-1272.

8. Nguyen KT, Laurent M, and Oualha N. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, pp. 17-31. https://doi.org/10.1016/j.adhoc.2015.01.006.

9. Airehrour D, Gutierrez J, and Ray SK. Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, pp. 198-213. https://doi.org/10.1016/j.jnca.2016.03.006.

10. Qin Y, Sheng QZ, Falkner NJ, Dustdar S, Wang H, and Vasilakos AV. When things matter: A survey on data-centric internet of things. Journal of Network and Computer Applications, 64, pp. 137-153. https://doi.org/10.1016/j.jnca.2015.12.016.

11. Loi F, Sivanathan A, Gharakheili HH, Radford A, and Sivaraman V. Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the Workshop on Internet of Things Security and Privacy, pp. 1-6. https://doi.org/10.1145/3139937.3139938.

12. Fernández-Caramés TM, and Fraga-Lamas P. A Review on the Use of Blockchain for the Internet of Things. Ieee Access, 6, pp. 32979-33001. https://doi.org/10.1109/ACCESS.2018.2842685.

13. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, and Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access, 7, pp. 82721-82743.

14. Berkay Celik Z, Fernandes E, Pauley E, Tan G, and McDaniel P. Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. arXiv e-prints, pp.arXiv-1809. https://doi.org/10.48550/arXiv.1809.06962.

15. Tabrizi FM, and Pattabiraman K. Design-level and code-level security analysis of IoT devices. ACM Transactions on Embedded Computing Systems (TECS), 18(3), pp. 1-25. https://doi.org/10.1145/3310353.

16. Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Akim NM, and Imran M. Deep learning and big data technologies for IoT security. Computer Communications, 151, pp. 495-517. https://doi.org/10.1016/j.comcom.2020.01.016.

17. Lao L, Li Z, Hou S, Xiao B, Guo S, and Yang Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1), pp. 1-32. https://doi.org/10.1145/3372136.

18. Sequeiros JB, Chimuco FT, Samaila MG, Freire MM, and Inácio PR. Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design. ACM Computing Surveys (CSUR), 53(2), pp. 1-32. https://doi.org/10.1145/3376123.

19. Polychronou NF, Thevenon PH, Puys M, and Beroulle V. A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms. ACM Transactions on Design Automation of Electronic Systems (TODAES), 27(1), pp. 1-35. https://doi.org/10.1145/3471936.

20. Gaspar PD, Fernandez CM, Soares VN, Caldeira JM, and Silva H. Development of technological capabilities through the internet of things (Iot): Survey of opportunities and barriers for iot implementation in Portugal’s agro-industry. Applied Sciences, 11(8), pp. 1-18. https://doi.org/10.3390/app11083454.

21. Wu Y, Wang Z, Ma Y, and Leung VC. Deep reinforcement learning for blockchain in industrial IoT: A survey. Computer Networks, 191, pp. 108004. https://doi.org/10.1016/j.comnet.2021.108004.

22. Latif S, Idrees Z, e Huma Z, and Ahmad J. Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions. Transactions on Emerging Telecommunications Technologies, 32(11), pp. 1-37. https://doi.org/10.1002/ett.4337.

23. Moustafa N, Turnbull B, and Choo KKR. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things Journal, 6(3), pp. 4815-4830. https://doi.org/10.1109/JIOT.2018.2871719.

24. Chio C, and Freeman D. Machine learning and security: Protecting systems with data and algorithms. " O'Reilly Media, Inc.", pp. 1-118.

Downloads

Published

2024-01-01

How to Cite

1.
Arunkumar S, Gowtham M, Revathi N, Krishnaprasath V. Enhancing Industrial Security with IoT-based Passive Intrusion Detection and Segmentation. Salud, Ciencia y Tecnología - Serie de Conferencias [Internet]. 2024 Jan. 1 [cited 2024 Nov. 21];3:934. Available from: https://conferencias.ageditor.ar/index.php/sctconf/article/view/844