Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats

IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Internet of Things Pub Date : 2024-09-21 DOI:10.1016/j.iot.2024.101377
Ju Lu , Arindam Bhar , Arindam Sarkar , Abdulfattah Noorwali , Kamal M. Othman
{"title":"Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats","authors":"Ju Lu ,&nbsp;Arindam Bhar ,&nbsp;Arindam Sarkar ,&nbsp;Abdulfattah Noorwali ,&nbsp;Kamal M. Othman","doi":"10.1016/j.iot.2024.101377","DOIUrl":null,"url":null,"abstract":"<div><div>Ensuring strong security measures against intrusions is of utmost importance in the ever-changing field of information management systems. Conventional Intrusion Detection Systems (IDS) frequently have difficulties in dealing with the ever-changing and intricate characteristics of contemporary cyber threats, particularly in the realm of the Internet of Things (IoT). The current body of research emphasizes the difficulties in attaining both high precision and real-time speed while still preserving the anonymity of data. This work tackles these concerns by presenting a scalable multi-model Machine Learning (ML) technique developed to improve real-time intrusion detection and ensure safe cryptographic key distribution. The suggested solution takes use of the widespread use of IoT devices, which increases the likelihood of advanced cyberattacks. Our approach involves implementing a ML-based automated IDS specifically designed for various IoT environments. These IDS enhance adaptability and accuracy. We also utilize Maximum–Minimum (Max–Min) normalization on the UNSW-NB15 and CICIoT2023 datasets to improve the accuracy of detecting intrusions. Furthermore, we classify a wide range of contemporary threats and typical internet traffic into nine distinct attack categories. To streamline data processing and improve system efficiency, we employ Principal Component Analysis (PCA) for dimensionality reduction. Additionally, we deploy six advanced ML models to optimize detection capabilities and accurately identify threats. Finally, we develop a secure key distribution mechanism using synchronized Artificial Neural Networks (ANNs). The process of mutual learning guarantees the secure distribution of keys among IoT networks, thus reducing the risks to secrecy. This novel methodology not only reinforces the ability to identify intrusions in real-time, but also improves the overall security stance of information management systems. This work significantly contributes to the field of digital security in information management by addressing the limits of current IDS solutions and presenting a complete, multi-faceted security strategy.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101377"},"PeriodicalIF":6.0000,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524003184","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Ensuring strong security measures against intrusions is of utmost importance in the ever-changing field of information management systems. Conventional Intrusion Detection Systems (IDS) frequently have difficulties in dealing with the ever-changing and intricate characteristics of contemporary cyber threats, particularly in the realm of the Internet of Things (IoT). The current body of research emphasizes the difficulties in attaining both high precision and real-time speed while still preserving the anonymity of data. This work tackles these concerns by presenting a scalable multi-model Machine Learning (ML) technique developed to improve real-time intrusion detection and ensure safe cryptographic key distribution. The suggested solution takes use of the widespread use of IoT devices, which increases the likelihood of advanced cyberattacks. Our approach involves implementing a ML-based automated IDS specifically designed for various IoT environments. These IDS enhance adaptability and accuracy. We also utilize Maximum–Minimum (Max–Min) normalization on the UNSW-NB15 and CICIoT2023 datasets to improve the accuracy of detecting intrusions. Furthermore, we classify a wide range of contemporary threats and typical internet traffic into nine distinct attack categories. To streamline data processing and improve system efficiency, we employ Principal Component Analysis (PCA) for dimensionality reduction. Additionally, we deploy six advanced ML models to optimize detection capabilities and accurately identify threats. Finally, we develop a secure key distribution mechanism using synchronized Artificial Neural Networks (ANNs). The process of mutual learning guarantees the secure distribution of keys among IoT networks, thus reducing the risks to secrecy. This novel methodology not only reinforces the ability to identify intrusions in real-time, but also improves the overall security stance of information management systems. This work significantly contributes to the field of digital security in information management by addressing the limits of current IDS solutions and presenting a complete, multi-faceted security strategy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用多模型机器学习方法加强实时入侵检测和安全密钥分配,以减轻保密威胁
在瞬息万变的信息管理系统领域,确保针对入侵采取强有力的安全措施至关重要。传统的入侵检测系统(IDS)往往难以应对当代网络威胁不断变化和错综复杂的特点,尤其是在物联网(IoT)领域。当前的研究强调了在保持数据匿名性的同时实现高精度和实时速度的困难。为解决这些问题,本研究提出了一种可扩展的多模型机器学习(ML)技术,旨在提高入侵检测的实时性并确保加密密钥的安全分发。物联网设备的广泛使用增加了高级网络攻击的可能性,所建议的解决方案正是利用了这一点。我们的方法包括实施基于 ML 的自动 IDS,该 IDS 专为各种物联网环境而设计。这些 IDS 增强了适应性和准确性。我们还在 UNSW-NB15 和 CICIoT2023 数据集上使用了最大最小(Max-Min)归一化技术,以提高检测入侵的准确性。此外,我们还将各种当代威胁和典型互联网流量分为九个不同的攻击类别。为了简化数据处理并提高系统效率,我们采用了主成分分析法(PCA)来降低维度。此外,我们还部署了六个先进的 ML 模型,以优化检测能力并准确识别威胁。最后,我们利用同步人工神经网络(ANN)开发了一种安全密钥分配机制。相互学习的过程保证了密钥在物联网网络之间的安全分配,从而降低了保密风险。这种新颖的方法不仅增强了实时识别入侵的能力,还改善了信息管理系统的整体安全状况。这项工作解决了当前 IDS 解决方案的局限性,提出了一个完整的、多方面的安全策略,为信息管理领域的数字安全做出了重大贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Internet of Things
Internet of Things Multiple-
CiteScore
3.60
自引率
5.10%
发文量
115
审稿时长
37 days
期刊介绍: Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. The journal will place a high priority on timely publication, and provide a home for high quality. Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.
期刊最新文献
Mitigating smart contract vulnerabilities in electronic toll collection using blockchain security LBTMA: An integrated P4-enabled framework for optimized traffic management in SD-IoT networks AI-based autonomous UAV swarm system for weed detection and treatment: Enhancing organic orange orchard efficiency with agriculture 5.0 A consortium blockchain-edge enabled authentication scheme for underwater acoustic network (UAN) Is artificial intelligence a new battleground for cybersecurity?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1