Open Access Open Access  Restricted Access Subscription Access

Enhancing Network Forensic and Deep Learning Mechanism for Internet of Things Networks


Affiliations
1 School of Computing, Mohan Babu University, Tirupati, 517 102, Andhra Pradesh, India., India
2 Department of CSE, RGMCET, Nandyal 518 501, Andhra Pradesh, India., India
3 Dept of ECE, GRIET, Hyderabad, 500 090, Andhra Pradesh, India., India
4 Department of ECE, Madanapalli Institute of Technology and Science, Madanapalli 517 325, Andhra Pradesh, India., India
5 Department of CSE, CMR Technical Campus, 501 401, Hyderabad, Telangana, India., India
 

The integration of intelligence into everyday products has been possible due to the ongoing shrinking of hardware and a rise in power efficiency. The Internet of Things (IoT) area arose from the tendency to add computational capabilities to so-called non-intelligent daily items. IoT systems are attractive targets for cyber-attacks because they have many applications. Adversaries use a variety of Advanced Persistent Threat (APT) strategies and trace the source of cyber-attack events to safeguard IoT networks. The Particle Deep Framework (PDF), which is proposed in this study, is a novel Network Forensics (NF) that encompasses the digital investigative phases for spotting & tracing attack activity in IoT networks. The suggested framework containsthree novel functionalities for dealing with encrypted networks, such as collecting network data flows & confirming their integrity, using a PSO algorithm, "Bot-IoT"& "UNSW NB15" datasets. The suggested PDF is related to several deep-learning methods. Experimental outcomes show that the proposed framework is very good at discovering & tracing cyber-attack occurrences when compared to existing approaches. The proposed design is implemented using neural network technology. The proposed design has 10% accuracy when compared with the existing structure. This paper is expected to offer a quick reference for researchers interested in understanding the use of network forensics and IOT.

Keywords

Attack Tracing, Botnets, IOT, Network Forensics, Particle Swarm Optimization.
User
Notifications
Font Size

  • Koroniotis N & Moustafa N, Enhancing network forensics with particle swarm and deep learning: The particle deep framework, arXiv preprint arXiv:2005.00722(2020).
  • Koroniotis N, Moustafa N & Sitnikova E, Forensics and deep learning mechanisms for botnets in the internet of things: A survey of challenges and solutions, IEEE Access, 7(2019) 61764–61785.
  • Ronen E, Shamir A, Weingarten A O & O'Flynn C, IoT goes nuclear: Creating a ZigBee chain reaction, 2017 IEEE Symposium on Security and Privacy(IEEE), 2017.
  • Meffert C, Clark D, Baggili I & Breitinger F, Forensic state acquisition from internet of things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition, Proc 12 th Int Conf Avail Reliability, and Security(2017), https://doi.org/10.1145/ 3098954.3104053.
  • Raghunath K K M, Koti M S, Sivakami R, Kumar V V, NagaJyothi G & Muthukumaran V, Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management, Int J Syst Assur Eng Manag (2022) 1–7, https://doi.org/10.1007/ s13198-021-01585-y.
  • Hassan M A, Samara G & Fadda M A, IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study, arXiv preprint arXiv:2203.15705 (2022).
  • Hossain M, Karim Y & Hasan R, FIF-IoT: A forensic investigation framework for IoT using a public digital ledger, 2018 IEEE Int Cong Internet Things (IEEE) 2018.
  • Hossain M, Hasan R & Zawoad S, Probe-IoT: A public digital ledger based forensicinvestigation framework for IoT, IEEE INFOCOM 2018 - IEEE Conf Comput Commun Workshops (Honolulu, HI, USA) 2018, 1–2, doi: 10.1109/INFCOMW.2018.8406875.
  • Shone N, Ngoc T N, Phai V D & Shi Q, A deep learning approach to network intrusion detection, IEEE Trans Emerg Topics Comput, 2(1)(2018) 41–50.
  • Prabakaran S & Mitra S, Survey of analysis of crime detection techniques using data mining and machine learning, J Phys Conf Ser(IOP Publishing) 1000(1) (2018).
  • Koroniotis N, Moustafa N,Sitnikova E & Turnbull B, Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset, Future Gener Comput Syst, 100(2019) 779–796.
  • Moustafa N & Slay J, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Commun Inf Syst Conf (IEEE) 2015.
  • Cebe M, Erdin E, Akkaya K, Aksu H & Uluagac S, Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles, IEEE Commun Magaz, 56(10)(2018) 50–57.
  • Babun L, Sikder A K,Acar A & Uluagac A S, Iotdots: A digital forensics framework for smart environments, arXiv preprint arXiv:1809.00745(2018).
  • Yuan X, Li C & Li X, DeepDefense: identifying DDoS attack via deep learning, 2017 IEEE Int Conf Smart Comput (IEEE) 2017.
  • Brun O, Yin Y, Gelenbe E, Kadioglu Y M, Augusto-Gonzalez J & Ramos M, Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments, in Security in Computer and Information Sciences, Euro-CYBERSEC 2018, (Springer International Publishing London, UK) 2018, 79–89.https://doi.org/ 10.1007/978-3-319-95189-8_8
  • Kennedy J & Eberhart R, Particle swarm optimization, Proc ICNN'95- IEEE Int Conf Neural Netw(IEEE) 1995, 1942–1948, DOI: 10.1109/ICNN.1995.488968
  • Wang D, Tan D & Liu L, Particle swarm optimization algorithm: an overview, Soft Comput, 22(2)(2018) 387–408.
  • Parsopoulos K E, Particle Swarm Methods, in Handbook of Heuris, edited by R Martí, P Panos & M Resende (Springer Cham) 2015, DOI 10.1007/978-3-319-07153-4_22-1.
  • Elbagoury M B, Maskeliunas R & Salem A B M M, A Hybrid Liar/Radar-based deep learning and vehicle recognition engine for autonomous vehicle pre-crash control,East-Eur J Enterp Technol, 5(9)(2018) 6–17, 10.15587/1729-4061.2018.141298.
  • Zhao T, Ekim Y, Joel P & Giorgio R, Automated vehicle safety guarantee, verification and certification: A survey, arXiv preprint arXiv:2202.02818 (2022).
  • Dequaire, Julie, Deep tracking in the wild: End-to-end tracking using recurrent neural networks, Int J Robot Res, 374(5)(2018) 492–512.

Abstract Views: 61

PDF Views: 64




  • Enhancing Network Forensic and Deep Learning Mechanism for Internet of Things Networks

Abstract Views: 61  |  PDF Views: 64

Authors

J Avanija
School of Computing, Mohan Babu University, Tirupati, 517 102, Andhra Pradesh, India., India
K E Naresh Kumar
Department of CSE, RGMCET, Nandyal 518 501, Andhra Pradesh, India., India
Ch Usha Kumari
Dept of ECE, GRIET, Hyderabad, 500 090, Andhra Pradesh, India., India
G Naga Jyothi
Department of ECE, Madanapalli Institute of Technology and Science, Madanapalli 517 325, Andhra Pradesh, India., India
K Srujan Raju
Department of CSE, CMR Technical Campus, 501 401, Hyderabad, Telangana, India., India
K Reddy Madhavi
School of Computing, Mohan Babu University, Tirupati, 517 102, Andhra Pradesh, India., India

Abstract


The integration of intelligence into everyday products has been possible due to the ongoing shrinking of hardware and a rise in power efficiency. The Internet of Things (IoT) area arose from the tendency to add computational capabilities to so-called non-intelligent daily items. IoT systems are attractive targets for cyber-attacks because they have many applications. Adversaries use a variety of Advanced Persistent Threat (APT) strategies and trace the source of cyber-attack events to safeguard IoT networks. The Particle Deep Framework (PDF), which is proposed in this study, is a novel Network Forensics (NF) that encompasses the digital investigative phases for spotting & tracing attack activity in IoT networks. The suggested framework containsthree novel functionalities for dealing with encrypted networks, such as collecting network data flows & confirming their integrity, using a PSO algorithm, "Bot-IoT"& "UNSW NB15" datasets. The suggested PDF is related to several deep-learning methods. Experimental outcomes show that the proposed framework is very good at discovering & tracing cyber-attack occurrences when compared to existing approaches. The proposed design is implemented using neural network technology. The proposed design has 10% accuracy when compared with the existing structure. This paper is expected to offer a quick reference for researchers interested in understanding the use of network forensics and IOT.

Keywords


Attack Tracing, Botnets, IOT, Network Forensics, Particle Swarm Optimization.

References