TY - GEN
T1 - A sequential scheme for detecting cyber attacks in IoT environment
AU - Soe, Yan Naung
AU - Feng, Yaokai
AU - Santosa, Paulus Insap
AU - Hartanto, Rudy
AU - Sakurai, Kouichi
PY - 2019/8
Y1 - 2019/8
N2 - With the rapid spread of the IoT (Internet of Things) devices, our daily life has been becoming more convenient and efficient. However, the attacker is more easily targeting the IoT devices to make them become attack destinations or bots for attacking other victims. This is because most of the IoT devices have not enough resources, memory and computation skill, to be equipped with an efficient security system. The mainstream of the actual IDSs (Intrusion Detection Systems) for traditional networks/computers and those for the IoT devices are still signature/rule-based. It is well known that such detection systems cannot handle new kind of attacks or new variants. And, the formal rule-based detection techniques would be circumvented by attackers. Moreover, for many IoT devices, so many signatures/rules often cannot be operated. Machine learning-based technologies are attracted much attention from many researchers and developers in recent years. Such methods can detect specific attacks or just detect anomalies. In many related works, one classifier is often trained for detecting multiple kinds of attacks, which is obviously cannot grantee an optimum performance for every kind of attacks. In this study, we proposed a system that detects multiple specific attacks in a sequential manner. That is, each kind of specific attacks is detected using a designated classifier instead of a common one. An artificial neural network as the classifier is trained and used for each kind of the specific attacks. As a result, the multiple classifiers can detect the specific attacks in a sequential manner. Our proposal is explained in detail in this paper and its performance is examined using different activation functions. We also make it clear which activation function is the best choice for our system.
AB - With the rapid spread of the IoT (Internet of Things) devices, our daily life has been becoming more convenient and efficient. However, the attacker is more easily targeting the IoT devices to make them become attack destinations or bots for attacking other victims. This is because most of the IoT devices have not enough resources, memory and computation skill, to be equipped with an efficient security system. The mainstream of the actual IDSs (Intrusion Detection Systems) for traditional networks/computers and those for the IoT devices are still signature/rule-based. It is well known that such detection systems cannot handle new kind of attacks or new variants. And, the formal rule-based detection techniques would be circumvented by attackers. Moreover, for many IoT devices, so many signatures/rules often cannot be operated. Machine learning-based technologies are attracted much attention from many researchers and developers in recent years. Such methods can detect specific attacks or just detect anomalies. In many related works, one classifier is often trained for detecting multiple kinds of attacks, which is obviously cannot grantee an optimum performance for every kind of attacks. In this study, we proposed a system that detects multiple specific attacks in a sequential manner. That is, each kind of specific attacks is detected using a designated classifier instead of a common one. An artificial neural network as the classifier is trained and used for each kind of the specific attacks. As a result, the multiple classifiers can detect the specific attacks in a sequential manner. Our proposal is explained in detail in this paper and its performance is examined using different activation functions. We also make it clear which activation function is the best choice for our system.
UR - http://www.scopus.com/inward/record.url?scp=85075128887&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85075128887&partnerID=8YFLogxK
U2 - 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00051
DO - 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00051
M3 - Conference contribution
T3 - Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
SP - 238
EP - 244
BT - Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019
Y2 - 5 August 2019 through 8 August 2019
ER -