Uploaded by alihyd1214

Artificial Intelligence and machine learning for Cloud and IoT security - Report

advertisement
CONTENTS
1.
2.
3.
4.
5.
6.
7.
INTRODUCTION ……………………………………………………………………………………………….1-2
LITERATURE REVIEW ………………………………………………………………………………………….3
PROPOSED MODEL……………………………...…………………………………………………………….3-5
COMPARISON WITH OTHER EXISTIG MODELS…………………………………………………………….6
FUTURE SCOPE AND RECOMMENDATION………………………………………………………………….7
CONCLUSION……………………………………………………………………………….…………………….7
BIBLIOGRAPHY……………………………………………………………………………….………………….8
ABSTRACT
TheoInternetoofoThingso(IoT)ohasoemergedoasoaoforefrontotechnology,ocaptivatingotheoattenti
on ofotheoresearchocommunityoandoprovingoeconomicallyolucrative for businesses. It
revolves aroundoconnectingonumerousodevicesoandoestablishingolinksobetween devices and
humans. Toofacilitateotheoexchangeoandoprocessingoofodata in IoT, a cloud computing
environment is essential.oSimultaneously,oartificialointelligenceo(AI)oisorequiredoto analyse
theodataostoredoinotheocloud infrastructure swiftly and reliably, enabling intelligent decisionmaking.
The communication among
interconnectedoIoTodevicesoreliesoonouniqueoidentifiersoandoembeddedosensors,outilizing the
internet and cloud-based network infrastructure for information exchange [1]. In theocurrent
eraoof big data, where the rapid and accurate analysis of cloud-based data is imperative, the
application of AI and machine learning (ML) has become critical. Despite the significant role
of AI in enhancing traditional cybersecurity, challenges persist in the form of vulnerabilities in
the cloud and theonetworkingoof IoT devices. Additionally, AI is increasingly utilized by
hackers, posing an ongoing threat to cybersecurity worldwide.
Furthermore, wirelessly accessed IoT devices deployed on public networks face constant
cyber threats. This research paperoproposesoa solution in the form of a hybrid detection
model that leveragesoartificial intelligenceoand machineolearningo(AI/ML). The aim is to
effectively address and mitigate IoT cyber threats in cloud computing environments,
addressing both host-based and network-level vulnerabilities.
1. INTRODUCTION
The concept of theo"Internet of Things" (IoT) was formally introduced by the International
TelecommunicationoUnion during the World Summitoon the Information Society (WSIS) in
2005 [1]. IoT encompasses a distributed networkothat integrates various sensor devices and
systems, includingosensor networks,oRFID devices, barcodeoandoQR code devices, and
global positioning systems,owithotheoInternetothrough both wired and wireless
communicationotechnologies.oThisoenablesoembeddedosystems to communicate
andointerconnect.
Theoevolution of IoT has followed three primary technical routes:
•
Development of Sensing,oIdentification, and Authentication Technologies: These
technologies serve as the foundation of IoT, with sensors being crucial components.
Sensors, acting as theonerveoendingsoofoIoT,oformotheolargest and fundamental part
of the IoT chain. General-purposeosensorodevicesohave become widespread, and
high-endosensorodevicesoinospecificofieldsohaveoalso seen significant progress.
•
DevelopmentoofoTransmissionoand Communication Technologies: These
technologiesoact as the backbone of IoT, ensuring theotransmission and aggregation
of theovastoamountoofoinformationocollectedobyoIoT devices. The progress in wired
and wireless networks, cellular networks, and other transmission and communication
technologies facilitates large-scale data transmission in IoT.
•
Developmentoof DataoComputingoandoProcessing Technologies: These technologies
areoessential for providing applicationsoandoservicesousing IoT data. Real-time
perceptionoandointelligentofeedbackofor a multitude of information nodes in IoT
applications require advancements in data computing and processing technologies.
Technologies like artificial intelligence and cloud computing contribute to enhancing
processing intelligence and effectiveness in IoT.
As technologies advance and applications expand, IoT has transformed into aoset of
solutions tailoredoforospecific applications. It has become a novel approach, tool, and
method for social governance by integrating andoinnovatingosolutions, connecting the
Internet with theophysicaloworld,oandoenabling intelligent interactions. IoT
applicationsospanovariousofields such as manufacturing, energyomanagemento(e.g.,osmart
grids),ourbanolifeo(e.g., smart cities),oandopersonal healthcare.
FIGURE 1.
o
Three-tier architecture of IoT.
o
o
Following traditional architecture and ISO/IEC 30141:2018 "IoT Reference Architecture," IoT t
ypically adopts an entity based architecture with three layers: the terminal perception layer,
network transport layer, and application service layer. The terminal perception layer collects
IoT data, the network transport layer facilitates communication, and the application service
layer processes and provides various applications and services. This architecture illustrates
the interactive relationships among the entities involved in IoT.
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
2. LITERATURE REVIEW
The realm of computer science encounters significant challenges with the advent of the
Internet of Things (IoT), presenting a novel concept for interconnected devices and smart
data. Key challenges for researchers in the IoT domain revolve around the preparation
and processing of data [9]. In this context, a comprehensive study proposed four data
mining models to address these challenges. The first model adopts a multi-layer
approach, incorporating layers for data collection, management, event processing, and
data mining services. The second model focuses on distributed data mining, particularly
for data deposition across different sites. The third model introduces a grid-based
approach, aiming tooimplementoheterogeneous,olarge-scale,oand high-performance
applications. Theofourthomodeloprovidesoaomulti-technology integration perspective,
outliningoaoframeworkofor the future Internet [9].
Another pertinent study by reference [10] delves into the warehousing of Radio
Frequency Identification (RFID) data, emphasizing the management andomining of RFID
streamodata.oReferenceo[11]ocontributes a systematic methodofor reviewing data mining
knowledgeoandotechniquesoacrossovarious applications. The study explores data mining
functionsosuchoasoclassification,oclustering, association analysis, time seriesoanalysis,
andooutlierodetection.oTheoresearchers find similarities between data generatedoby data
miningoapplications,oincludingoe-commerce,oindustry,ohealthcare, city governance, and
IoT data. They then align popular data mining functionalities with specific applications,
determining the most appropriate techniques for processing data in each context [11].
In response to the challenges encountered in preparing and processing IoT data through
data mining techniques, reference [12] conducted a comprehensive survey. The authors
structure their research into three major sections. The first and second sections provide
insights into IoT, the nature of the data, and challenges in the field, including the
establishment of models for mining and mining algorithms specific to IoT. The third
section addresses the potential and open issues in the domain, offering a holistic
perspective on the existing landscape and future directions [12].
3. PROPOSED MODEL
The block diagram in Figure 5 depicts the data sourced from various specialized sensor
outlets, undergoes anonymization, storage, and analysis through Artificial Intelligence
(AI) technology. Based on the analysis outcomes, multiple actions are implemented to
optimize safety and efficiency parameters for the intelligent home application in use.
These distinct stages are essential to ensure a secure, confidential, and intelligent living
environment while efficiently utilizing available resources such as power, water, and gas.
o
o
o
o
o
o
o
o
o
Fig 5: Block diagram of a secure and privacy-preserving in Smart home using IoT
enabled AI
o
o
o
o
Technology
Security Parameters Configuration
o
o
Earlier integration into the intelligent home system, a new IoT device undergoes a crucial
process. The IoT platform incorporates cryptographic algorithms to meet the
confidentiality,ointegrity,oandoencryption criteria of specific devices. The success and
widespreadoadoption of robust IoToarchitectures, serving various applications, hinge on
the trust of prospective users [21]. This trust is critical due to potential damages caused
by the theft or misuse of private information, impacting individuals' physical, financial,
and social lives. Implementing sufficient security measures is essential to address
potential safety risks, playing a vital role in safeguarding smart homes [8,9].
o
o
o
o
o
o
o
o
I.
Corrupted or ForgedoData:
o
o
Thisoincidentocan disrupt the proper functioning of the surveillanceosystem, leading to
incorrectodecisionsobasedoon inaccurate information. Causes include deliberate
suspicious IoT system configurations, comprehensive forged data processing by IoT
computers, and data changes in transitionothroughohackedoIoToGatewaysoin Multi-Hop
Interaction [15,16].
II.
Replay Attacks:
o
This intrusion occurs when IoT devices producing data lack an anti-replay system,
allowingotheouseoofoobsoleteoinformationoandotheomaking of erroneous decisions [10].
III.
IP Spoofing and Identity Usurpation:
o
o
Attacks like identification subversion and IP Spoofing pose threats to IoT devices if
advanced protocols for data origin encryption, such as IPsec, are not in place [6,7].
o
o
4. COMPARISON WITH OTHER EXISTING MODELS
IoT Device Groups in a Smart Home:
This section delineates three major groups of IoT devices used in a smart home setting:
Wearables, IoT devices for tracking equipment, and in-home devices for monitoring
environments. Each system detects variables and transmits data readings regularly or
upon meeting specific standards. The choice of IoT Gateway for data transmission
involves a trust protection system [10].
o
o
o
DataoAggregationoand Relaying:
Onceodataoisocollectedoat the IoT Gateway stage, it is either relayed to its endpoint or
stored by the IoT Gateway before transmitting accumulated values. The decision to
aggregate or relay depends on the target system and the interpret value of the
data.oSpecializedoIoToGatewaysomayobeousedoforoheavy-weightoactivitiesonot performed
by IoT devices [4,5].
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
Cloud-Based Data Analytics:
o
o
The gathered data sent by IoT gateways is stored, processed, and analysed in the cloud.
Various approaches, such as Data Generalization and Differential Privacy, are
employedoforodataoprotection.oTheochallengeoliesoinoanonymizing data while minimizing
identity losses. Anonymized data is forwarded to theoAI-basedodataoanalytics tool,
typicallyothroughoaomachine-learningoalgorithm,ocreatingoaorealisticounderstanding of the
controlled environment (smart home). The analysed data informs optimum measures for
the actuator system, with historical data used to optimize machine-learning model
learning and testing [19,15,16].
o
o
5. FUTURE SCOPE AND RECOMMENDATION
o
ArtificialoIntelligenceo(AI)oandoMachineoLearningo(ML) play a pivotal role in enhancing
cybersecurity, extendingotheiropositiveoimpactotooour daily lives through IoT devices,
smarterohomes,oandointelligentovehicles.oA comprehensive security solution is
considered incomplete without integrating AI and ML features.oSolutionsodeveloped with
AI and ML can effectively identify patterns by detecting similarities among past attacks,
issuing instant warnings when encountering similaropatterns.oNotably,oAI/ML excels in
continuously deciphering userobehavior,oadaptingouseopatterns,oand identifying
irregularities [17].
As part of our researchorecommendations,osecurity experts unanimously advocate for
standardizing datasets to facilitate quick data analysis by ML-based solutions. The scale
ofoouroresearchodatasetoisomeasured in exabytes. Once datasets are well-definedoand
standardized,oML-basedosystemsowillosignificantlyocontributeoto combating cyber threats.
Building on our proposedoresearchosolution,oweosuggestocarefully considering whether to
adoptoanounsupervisedoorosupervisedosolutionobasedoonofeatures extracted from our
dataset.oWhileoAIoandoMLosystemsocanooperateoindependently, a modest human
intervention enhances system balance and effectiveness.
6. CONCLUSION
In conclusion, the evolution of the "Internet of Things" (IoT) has transformed it into a
multifaceted solution set, impacting various aspects of our lives. The three primary technical
routes of development include advancements in Sensing,oIdentification,oand Authentication
Technologies,oTransmissionoandoCommunicationoTechnologies,oandoData Computing and
ProcessingoTechnologies. The literature review emphasizes the challenges in IoT,
particularly the preparation and processing of data. Various data mining models have been
proposed, addressing issues of data collection, management, event processing, and mining
services. The importance of standardizing datasets for machine learning (ML) solutions is
highlighted, enabling efficient data analysis and contributing to combating cyber threats.
The proposed model illustrates a secure and privacy-preserving smart home using IoTenabled AI technology. The security parameters configuration outlines measures to address
potential risks, including corrupted or forged data, replay attacks, and IP spoofing. The
comparison with existing models emphasizes the trust protection system in IoT device
groups, data aggregation and relaying at IoT Gateways, and cloud-based data analytics for
optimum measures and historical data optimization.
o
o
o
o
o
o
o
o
o
o
Lookingotootheofuture,otheointegrationoofoArtificialoIntelligence (AI) and Machine Learning
(ML) emerges as a pivotal aspect in enhancing cybersecurity. Recommendations include
standardizing datasets for ML-based solutions and carefully considering the adoption of
unsupervised or supervised solutions.
7. BIBLIOGRAPHY
▪
Dr. S. Hrushikesava Raju, Dr. Lakshmi Ramani Burra, Dr. Ashok Koujalagi, and
Saiyed Faiayaz Waris, "Tourism Enhancer App: User-Friendliness of a Map with
Relevant Features," IOP Conference Series, Materials Science and Engineering,
981, 2, 10.1088/1757-899X/981/2/022067.
▪
Praveen, S.P., Rao, K.T., Janakiramaiah, B., "Effective Allocation of Resources and
Task Scheduling in Cloud Environment using Social Group Optimization," Arabian
Journal for Science and Engineering, 10.1007/s13369-017-2926-z.
▪
Pravin Kshirsagar, Dr. Sudhir Akojwar, "Classification and Prediction of Epilepsy
using FFBPNN with PSO," IEEE International Conference on Communication
Networks, 2015.
▪
Bakhsh, S.T.; Alghamdi, S.; Alsemmeari, R.A.; Hassan, S., "An adaptive intrusion
detection and prevention system for the Internet of Things," Int. J. Distrib. Sens.
Netw. 2019, 15.
▪
Yassin, W.; Udzir, N.; Muda, Z.; Abdullah, A.; Abdullah, M.T., "A Cloud-based
Intrusion Detection Service framework," Proceedings of the 2012 International
Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec),
Kuala Lumpur, Malaysia, 26–28 June 2012.
▪
Thamilarasu, G.; Chawla, S., "Towards Deep-Learning-Driven Intrusion Detection for
the Internet of Things," Sensors 2019, 19, 1977.
▪
Khan, Z.A.; Herrmann, P., "Recent Advancements in Intrusion Detection Systems for
the Internet of Things," Secure. Commun. Netw. 2019, 2019, 1–19.
▪
Bhamare, D.; Salman, T.; Samaka, M.; Erbad, A.; Jain, R., "Feasibility of Supervised
Machine Learning for Cloud Security," Proceedings of the International Conference
on Information Science and Security, Jaipur, India, 16–20 December 2016.
▪
Pravin Kshirsagar And Sudhir Akojwar- July 2016 "Hybrid Heuristic Optimization For
Benchmark Datasets" International Journal Of Computer Applications 146(7):11-16.
▪
Seitz, L.; Selander, G.; Wahlstroem, E.; Erdtman, S.; Tschofenig, H., "Authentication
and Authorization for Constrained Environments (ACE) using the OAuth 2.0
Framework (ACEOAuth)," Internet Engineering Task Force,-24 sep 2019.
▪
Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and
privacy in distributed internet of things," Computer Networks, 57(10):2266–2279,
2013.
▪
Praveen, S.P., Rao, K.T., Janakiramaiah, B., "Effective Allocation of Resources and
Task Scheduling in Cloud Environment using Social Group Optimization," Arabian
Journal for International Journal of Grid and Distributed Computing, Vol 14, No.1,
(2021), pp., 1257-1275.
▪
Rachapudi, V., Nitish, N., Samaikya, S., Sathvik, U.P., Devi, S.A. (2020).,
"Performance Comparison of applications with and without Web Frameworks,"
International Journal of Advanced Trends in Computer Science and Engineering, 9,
1020-1028, 10.30534/ijatcse/2020/19922020.
▪
Anjali Devi, S., Sapkota, P., Rohit Kumar, K., Pooja, S., Sandeep, M.S., "Comparison
of classification algorithms on twitter data using sentiment analysis," International
Journal of Advanced Trends in Computer Science and Engineering, 2020, 9(5), pp.
8170–8173.
▪
SG Akojwar, P Kshirsagar-2016 "A Novel Probabilistic-PSO Based Learning
Algorithm for Optimization of Neural Networks for Benchmark Problems" - WSEAS
TRANSACTIONS on ELECTRONICS, Volume 7, 2016.
▪
Gutiérrez, E. Theodoridis, G. Mylonas, F. Shi, U. Adeel, L. Diez, D. Amaxilatis, J.
Choque, G. Camprodom, J. McCann, and L. Muñoz, "Co-creating the cities of the
future," Sensors, vol. 16, no. 11, p. 1971, Nov. 2016.
▪
P. Kshirsagar and S. Akojwar, "Classification & Detection of Neurological Disorders
using ICA & AR as Feature Extractor," Int. J. Ser. Eng. Sci. IJSES, vol. 1, no. 1, Jan.
2015.
▪
J. Venkatesh, B. Aksanli, C. S. Chan, A. S. Akyurek, and T. S. Rosing, "Modular and
personalized smart health application design in a smart city environment," IEEE
Internet Things J., vol. 5, no. 2, pp. 614–623, Apr. 2018.
▪
ITU Internet Reports 2005: The Internet of Things, 2005.
▪
C. Hai-ming, "Key Technologies and Applications of Internet of Things," Comput. Sci.,
vol. 36, pp. 1-4, 2010.
▪
C.-L. Zhong, Z. Zhu and R.-G. Huang, "Study on the IOT architecture and gateway
technology," Proc. 14th Int. Symp. Distrib. Comput. Appl. Bus. Eng. Sci. (DCABES),
pp. 196-199, Aug. 2015.
▪
M. Bauer, M. Boussard, N. Bui, J. D. Loof, C. Magerkurth, S. Meissner, et al., "IoT
reference architecture," Enabling Things to Talk, pp. 163-211, 2013.
▪
J. J. Cano, "ISACA JOURNAL," 01 September 2016. [Online]. Available:
https://www.isaca.org/resources/isacajournal/issues/2016/volume-5/cyberattackstheinstability-ofsecurity-and-control-knowledge. [Accessed 04 04 2020].
▪
"Packt," 2020. [Online]. Available: https://hub.packtpub.com/25-datasets-deeplearning-iot/. [Accessed 04 05 2020].
▪
J. Ghanchi, 19 March 2019. [Online]. Available: https://thenewstack.io/thepossibilities-of-ai-and-machinelearning-for-cybersecurity/.
Download