1188 61
Full Length Article
Full Length Article
Volume 12 , Issue 2, PP: 89-98 , 2024 | Cite this article as | XML | Html |PDF

Title

An IoT Device-Level Vulnerability Control Model Through Federated Detection

  Umar Audi Isma’ila 1 * ,   Kamaluddeen Usman Danyaro 2 ,   Mohd Fadzil Hassan 3 ,   Aminu Aminu Muazu 4 ,   M. S. Liew 5

1  Computer and Information Sciences Department, Faculty of Science and Information Technology, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia; Centre for Research in Data Science (CeRDaS), Computer Information Science Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia
    (umar_22005104@utp.edu.my)

2  Computer and Information Sciences Department, Faculty of Science and Information Technology, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia; Centre for Research in Data Science (CeRDaS), Computer Information Science Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia
    (kamaluddeen.usman@utp.edu.my)

3  Computer and Information Sciences Department, Faculty of Science and Information Technology, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia; Centre for Research in Data Science (CeRDaS), Computer Information Science Department, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia
    (mfadzil_hassan@utp.edu.my)

4  Computer and Information Sciences Department, Faculty of Science and Information Technology, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia; Computer Sciences Department, Faculty of Natural and Applied Science, Umaru Musa Yar’adua University Katsina, Nigeria
    (aminu.aminu@umyu.edu.ng)

5  Civil and Environmental Engineering, Faculty of Engineering, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Perak, Malaysia
    (shahir_liew@utp.edu.my)


Doi   :   https://doi.org/10.54216/JISIoT.120207

Received: August 18, 2023 Revised: November 21, 2023 Accepted: April: 17, 2024

Abstract :

In the rapidly expanding Internet of Things (IoT) landscape, the security of IoT devices is a major concern. The challenge lies in the lack of intrusion detection systems (IDS) models for these devices. This is due to resource limitations, resulting in, single point of failure, delayed threat detection and privacy issues when centralizing IDS processing. To address this, a LiteDLVC model is proposed in this paper, employing a multi-layer perceptron (MLP) in a federated learning (FL) approach to minimize the vulnerabilities in IoT system. This model manages smaller datasets from individual devices, reducing processing time and optimizing computing resources. Importantly, in the event of an attack, the LiteDLVC model targets only the compromised device, protecting the FL aggregator and other IoT devices. The model's evaluation using the BoT-IoT dataset on TensorFlow Federated (TFF) demonstrates higher accuracy and better performance with full features subset of 99.99% accuracy on test set and achieved average of 1.11sec in detecting bot attacks through federated detection. While on 10-best subset achieved 99.99 on test with 1.14sec as average detection time. Notably, this highlights that LiteDLVC model can potential secure IoT device from device level very efficiently. To improve the global model convergence, we are currently exploring the use genetic algorithm.  This could lead to better performance on diverse IoT data distributions, and increased overall efficiency in FL scenes with non-IID data.

Keywords :

IoT device-level vulnerability , Federated detection , Intrusion detection model , Bot-IoT dataset evaluation

References :

[1]    Bansal, S. and D. Kumar, IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication. International Journal of Wireless Information Networks, 2020. 27(3): p. 340-364.

[2]    Alhandi, S.A., H. Kamaludin, and N.A.M. Alduais, Trust Evaluation Model in IoT Environment: A Comprehensive Survey. IEEE Access, 2023.

[3]    Kumari, P. and A.K. Jain, A comprehensive study of DDoS attacks over IoT network and their countermeasures. Computers & Security, 2023: p. 103096.

[4]    Jaidka, H., N. Sharma, and R. Singh. Evolution of iot to iiot: Applications & challenges. in Proceedings of the international conference on innovative computing & communications (ICICC). 2020.

[5]    Alduais, N.A.M., J. Abdullah, and A. Jamil, RDCM: An efficient real-time data collection model for IoT/WSN edge with multivariate sensors. IEEE Access, 2019. 7: p. 89063-89082.

[6]    Farivar, F., et al., Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery. Information Sciences, 2023. 626: p. 262-274.

[7]    Nguyen, D.C., et al., 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal, 2021. 9(1): p. 359-383.

[8]    Koroniotis, N., N. Moustafa, and E. Sitnikova, Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions. IEEE Access, 2019. 7: p. 61764-61785.

[9]    Sarhan, M., S. Layeghy, and M. Portmann, Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection. arXiv preprint arXiv:2104.07183, 2021.

[10] Ahmad, R. and I. Alsmadi, Machine learning approaches to IoT security: A systematic literature review. Internet of Things, 2021. 14: p. 100365.

[11] Rahman, S.A., et al., Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Network, 2020. 34(6): p. 310-317.

[12] McMahan, B., et al. Communication-efficient learning of deep networks from decentralized data. in Artificial intelligence and statistics. 2017. PMLR.

[13] Nguyen, D.C., et al., Federated Learning for Internet of Things: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 2021. 23(3): p. 1622-1658.

[14] Cook, A.A., G. Mısırlı, and Z. Fan, Anomaly detection for IoT time-series data: A survey. IEEE Internet of Things Journal, 2019. 7(7): p. 6481-6494.

[15] Lian, Z. and C. Su. Decentralized Federated Learning for Internet of Things Anomaly Detection. in Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 2022.

[16] Shahid, O., et al. Detecting Network Attacks using Federated Learning for IoT Devices. in 2021 IEEE 29th International Conference on Network Protocols (ICNP). 2021. IEEE.

[17] Abdelbasset, M., et al., Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach. IEEE Internet of Things Journal, 2022.

[18] Rey, V., et al., Federated learning for malware detection in iot devices. Computer Networks, 2022. 204: p. 108693.

[19] Tabassum, A., et al., Fedgan-ids: Privacy-preserving ids using gan and federated learning. Computer Communications, 2022. 192: p. 299-310.

[20] Li, J., et al. FIDS: Detecting DDoS Through Federated Learning Based Method. in 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2021. IEEE.

[21] Zhao, R., et al., Intelligent intrusion detection based on federated learning aided long short-term memory. Physical Communication, 2020. 42: p. 101157.

[22] Ruzafa-Alcazar, P., et al., Intrusion Detection based on Privacy-preserving Federated Learning for the Industrial IoT. IEEE Transactions on Industrial Informatics, 2021.

[23] Man, D., et al., Intelligent intrusion detection based on federated learning for edge-assisted Internet of Things. Security and Communication Networks, 2021. 2021.

[24] Koroniotis, N., et al., Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 2019. 100: p. 779-796.

[25] Peterson, J.M., J.L. Leevy, and T.M. Khoshgoftaar. A review and analysis of the bot-iot dataset. in 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE). 2021. IEEE.


Cite this Article as :
Style #
MLA Umar Audi Isma’ila, Kamaluddeen Usman Danyaro , Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew. "An IoT Device-Level Vulnerability Control Model Through Federated Detection." Full Length Article, Vol. 12, No. 2, 2024 ,PP. 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)
APA Umar Audi Isma’ila, Kamaluddeen Usman Danyaro , Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew. (2024). An IoT Device-Level Vulnerability Control Model Through Federated Detection. Journal of Full Length Article, 12 ( 2 ), 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)
Chicago Umar Audi Isma’ila, Kamaluddeen Usman Danyaro , Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew. "An IoT Device-Level Vulnerability Control Model Through Federated Detection." Journal of Full Length Article, 12 no. 2 (2024): 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)
Harvard Umar Audi Isma’ila, Kamaluddeen Usman Danyaro , Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew. (2024). An IoT Device-Level Vulnerability Control Model Through Federated Detection. Journal of Full Length Article, 12 ( 2 ), 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)
Vancouver Umar Audi Isma’ila, Kamaluddeen Usman Danyaro , Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew. An IoT Device-Level Vulnerability Control Model Through Federated Detection. Journal of Full Length Article, (2024); 12 ( 2 ): 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)
IEEE Umar Audi Isma’ila, Kamaluddeen Usman Danyaro, Mohd Fadzil Hassan, Aminu Aminu Muazu, M. S. Liew, An IoT Device-Level Vulnerability Control Model Through Federated Detection, Journal of Full Length Article, Vol. 12 , No. 2 , (2024) : 89-98 (Doi   :  https://doi.org/10.54216/JISIoT.120207)