Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

被引:112
作者
Diro, Abebe [1 ]
Chilamkurti, Naveen [2 ]
机构
[1] La Trobe Univ, Dept IT Comp Sci & IT, Bundoora, Vic, Australia
[2] La Trobe Univ, Comp Sci & Informat Technol, Bundoora, Vic, Australia
关键词
DEEP LEARNING APPROACH;
D O I
10.1109/MCOM.2018.1701270
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The evolution and sophistication of cyber-attacks need resilient and evolving cybersecurity schemes. As an emerging technology, the Internet of Things (IoT) inherits cyber-attacks and threats from the IT environment despite the existence of a layered defensive security mechanism. The extension of the digital world to the physical environment of IoT brings unseen attacks that require a novel lightweight and distributed attack detection mechanism due to their architecture and resource constraints. Architecturally, fog nodes can be leveraged to offload security functions from IoT and the cloud to mitigate the resource limitation issues of IoT and scalability bottlenecks of the cloud. Classical machine learning algorithms have been extensively used for intrusion detection, although scalability, feature engineering efforts, and accuracy have hindered their penetration into the security market. These shortcomings could be mitigated using the deep learning approach as it has been successful in big data fields. Apart from eliminating the need to craft features manually, deep learning is resilient against morphing attacks with high detection accuracy. This article proposes an LSTM network for distributed cyber-attack detection in fog-to-things communication. We identify and analyze critical attacks and threats targeting IoT devices, especially attacks exploiting vulnerabilities of wireless communications. The conducted experiments on two scenarios demonstrate the effectiveness and efficiency of deeper models over traditional machine learning models.
引用
收藏
页码:124 / 130
页数:7
相关论文
共 15 条
[1]  
[Anonymous], 2016, ROAD MAT PAVEMENT DE
[2]  
[Anonymous], 2015, South African Computer Journal, DOI DOI 10.18489/SACJ.V56I1.248
[3]  
[Anonymous], 2015, P EUR S ART NEUR NET
[4]   Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks [J].
Bontemps, Loic ;
Van Loi Cao ;
McDermott, James ;
Nhien-An Le-Khac .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 :141-152
[5]  
Bahnsen AC, 2017, PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P1, DOI 10.1109/ECRIME.2017.7945048
[6]  
Diro A. A., 2017, MOBILE NETW APPL, P1
[7]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[8]   Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :169-175
[9]   Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Gritzalis, Stefanos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :184-208
[10]  
Saxe J., 2017, ARXIV170208568CS