Abstract
AbstractThe next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which has facilitated every entity the power to connect to the web. However, this magnifying depth of the digital pool oil the wheels for the attackers to penetrate. Thus, these threats and attacks have become a prime concern among researchers. With promising features, Machine Learning (ML) has been the solution throughout to detect these threats. But, the general ML-based solutions have been declining with the practical implementation to detect unknown threats due to changes in domains, different distributions, long training time, and lack of labelled data. To tackle the aforementioned issues, Transfer Learning (TL) has emerged as a viable solution. Motivated by the facts, this article aims to leverage TL-based strategies to get better the learning classifiers to detect known and unknown threats targeting IoT systems. TL transfers the knowledge attained while learning a task to expedite the learning of new similar tasks/problems. This article proposes a learning-based threat model for attack detection in the Smart Home environment (SALT). It uses the knowledge of known threats in the source domain (labelled data) to detect the unknown threats in the target domain (unlabelled data). The proposed scheme addresses the workable differences in feature space distribution or the ratio of attack instances to a normal one, or both. The proposed threat model would show the implying competence of ML with the TL scheme to improve the robustness of learning classifiers besides the threat variants to detect known and unknown threats. The performance analysis shows that traditional schemes underperform for unknown threat variants with accuracy dropping to 39% and recall to 56.
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Jadav, N. et al. Deep learning and onion routing-based collaborative intelligence framework for smart homes underlying 6g networks. IEEE Trans. Netw. Serv. Manag.https://doi.org/10.1109/TNSM.2022.3164715 (2022).
2. Gyarmathy, K. Comprehensive guide to IoT statistics you need to know in 2020. https://www.vxchnge.com/blog/iot-statistics. (Accessed 2021).
3. Networks, P. 2020 unit 42 IoT threat report. https://unit42.paloaltonetworks.com/iot-threat-report-2020/. (Accessed 2021).
4. Doffman, Z. Cyberattacks on IoT devices surge 300 percent in 2019, ‘measured in billions’, report claims. https://www.forbes.com/sites/zakdoffman/2019/09/14/dangerous-cyberattacks-on-iot-devices-up-300-in-2019-now-rampant-report-claims. (Accessed 2021).
5. Seals, T. IoT attacks skyrocket, doubling in 6 months. https://threatpost.com/iot-attacks-doubling/169224/. (Accessed 2021).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献