Skip to main content
Top
Published in: Telecommunication Systems 4/2024

15-02-2024

Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks

Authors: Sonam Bhardwaj, Mayank Dave

Published in: Telecommunication Systems | Issue 4/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT) environment, highlighting the crucial importance of protecting these networks in the face of increasing amounts of IoT data. The paper explores the intricacies of deploying security mechanisms for Internet of Things (IoT) devices, specifically those that are restricted by limited resources. This study examines the inherent weaknesses in IoT systems and analyses the strategies used by malicious individuals to gain control and privileges. In order to tackle these difficulties, the study suggests a sophisticated security system that combines artificial intelligence and an intelligent attack graph. An outstanding characteristic of the model incorporates a method devised to restrain virus spread and accelerate network restoration by introducing virtual nodes. The research showcases the results of the vulnerable attack path predictor (VAPP) module of the proposed model, emphasising its exceptional accuracy in distinguishing between black (0) and red (1) attack paths compared to alternative Machine Learning techniques. Moreover, a thorough evaluation of the module's performance is carried out, with a specific emphasis on security concerns and predictive capacities. Proverif is utilised to validate the security settings and evaluate the resilience of the secret keys. The findings demonstrate a detection rate of 98.48% and an authentication rate of 85%, outperforming the achievements of earlier studies. The contributions greatly enhance the ability of IoT networks to withstand challenges, and the use of cryptographic verification confirms its dependability in the ever-changing digital environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stergiopoulos, G., Dedousis, P., & Gritzalis, D. (2021). Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. International Journal of Information Security, 21, 1–23. Stergiopoulos, G., Dedousis, P., & Gritzalis, D. (2021). Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. International Journal of Information Security, 21, 1–23.
2.
go back to reference Skandylas, C., Zhou, L., Khakpour, N., & Roe, S. (2021). Security risk analysis of multi-stage attacks based on data criticality. In 2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) (pp. 13–20). Skandylas, C., Zhou, L., Khakpour, N., & Roe, S. (2021). Security risk analysis of multi-stage attacks based on data criticality. In 2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) (pp. 13–20).
3.
go back to reference Ehrenkranz, T., & Li, J. (2009). On the state of IP spoofing defense. ACM Transactions on Internet Technology (TOIT), 9(2), 1–29.CrossRef Ehrenkranz, T., & Li, J. (2009). On the state of IP spoofing defense. ACM Transactions on Internet Technology (TOIT), 9(2), 1–29.CrossRef
4.
go back to reference Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems, 82, 395–411.CrossRef Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems, 82, 395–411.CrossRef
5.
go back to reference Stute, M., Heinrich, A., Lorenz, J., & Hollick, M. (2021). Disrupting continuity of Apple’s wireless ecosystem security: New tracking, DoS, and MitM attacks on iOS and macOS through bluetooth low energy, {AWDL}, and Wi-Fi. In 30th {USENIX} Security Symposium ({USENIX} Security 21) (pp. 1–19). Stute, M., Heinrich, A., Lorenz, J., & Hollick, M. (2021). Disrupting continuity of Apple’s wireless ecosystem security: New tracking, DoS, and MitM attacks on iOS and macOS through bluetooth low energy, {AWDL}, and Wi-Fi. In 30th {USENIX} Security Symposium ({USENIX} Security 21) (pp. 1–19).
6.
go back to reference Manjula, B. V. B., & Naik, R. L. (2021). Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking. International Journal of Future Generation Communication and Networking, 14(1), 359–371. Manjula, B. V. B., & Naik, R. L. (2021). Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking. International Journal of Future Generation Communication and Networking, 14(1), 359–371.
7.
go back to reference Alieyan, K., Almomani, A., Anbar, M., Alauthman, M., Abdullah, R., & Gupta, B. B. (2021). DNS rule-based schema to botnet detection. Enterprise Information Systems, 15(4), 545–564.ADSCrossRef Alieyan, K., Almomani, A., Anbar, M., Alauthman, M., Abdullah, R., & Gupta, B. B. (2021). DNS rule-based schema to botnet detection. Enterprise Information Systems, 15(4), 545–564.ADSCrossRef
8.
go back to reference Abdullah, M., Raza, I., Zia, T., & Hussain, S. A. (2021). Interest flooding attack mitigation in a vehicular named data network. IET Intelligent Transport Systems, 15(4), 525–537.CrossRef Abdullah, M., Raza, I., Zia, T., & Hussain, S. A. (2021). Interest flooding attack mitigation in a vehicular named data network. IET Intelligent Transport Systems, 15(4), 525–537.CrossRef
9.
go back to reference Mehmandoost Kotlar, A., & Javaux, M. (2021, April). Impact of soil water potential pattern on root water uptake distribution and leaf water potential. In EGU General Assembly Conference Abstracts (pp. EGU21–15095). Mehmandoost Kotlar, A., & Javaux, M. (2021, April). Impact of soil water potential pattern on root water uptake distribution and leaf water potential. In EGU General Assembly Conference Abstracts (pp. EGU21–15095).
10.
go back to reference Ramesh, S., Yaashuwanth, C., Prathibanandhi, K., Basha, A. R., & Jayasankar, T. (2021). An optimized deep neural network-based DoS attack detection in wireless video sensor network. Journal of Ambient Intelligence and Humanized Computing, 1–14. Ramesh, S., Yaashuwanth, C., Prathibanandhi, K., Basha, A. R., & Jayasankar, T. (2021). An optimized deep neural network-based DoS attack detection in wireless video sensor network. Journal of Ambient Intelligence and Humanized Computing, 1–14.
11.
go back to reference Ali, M., Nadeem, M., Siddique, A., Ahmad, S., & Ijaz, A. (2020). Addressing sinkhole attacks in: Wireless sensor networks-a review. International Journal of Scientific & Technology Research, 9(08), 406–411. Ali, M., Nadeem, M., Siddique, A., Ahmad, S., & Ijaz, A. (2020). Addressing sinkhole attacks in: Wireless sensor networks-a review. International Journal of Scientific & Technology Research, 9(08), 406–411.
12.
go back to reference Jin, J., Yu, K., Kua, J., Zhang, N., Pang, Z., & Han, Q. L. (2023). Cloud-fog automation: Vision, enabling technologies, and future research directions. IEEE Transactions on Industrial Informatics. Jin, J., Yu, K., Kua, J., Zhang, N., Pang, Z., & Han, Q. L. (2023). Cloud-fog automation: Vision, enabling technologies, and future research directions. IEEE Transactions on Industrial Informatics.
13.
go back to reference Kotis, K., Stavrinos, S., & Kalloniatis, C. (2022). Review on semantic modeling and simulation of cybersecurity and interoperability on the internet of underwater things. Future Internet, 15(1), 11.CrossRef Kotis, K., Stavrinos, S., & Kalloniatis, C. (2022). Review on semantic modeling and simulation of cybersecurity and interoperability on the internet of underwater things. Future Internet, 15(1), 11.CrossRef
14.
go back to reference Deng, X., Chen, B., Chen, X., Pei, X., Wan, S., & Goudos, S. K. (2023). Trusted edge computing system based on intelligent risk detection for smart IoT. IEEE Transactions on Industrial Informatics. Deng, X., Chen, B., Chen, X., Pei, X., Wan, S., & Goudos, S. K. (2023). Trusted edge computing system based on intelligent risk detection for smart IoT. IEEE Transactions on Industrial Informatics.
15.
go back to reference Zhang, Q., Chen, D., Mahajan, Y., Chen, R., Ha, D. S., & Cho, J. H. (2023). Attack-resistant, energy-adaptive monitoring for smart farms: Uncertainty-aware deep reinforcement learning approach. IEEE Internet of Things Journal. Zhang, Q., Chen, D., Mahajan, Y., Chen, R., Ha, D. S., & Cho, J. H. (2023). Attack-resistant, energy-adaptive monitoring for smart farms: Uncertainty-aware deep reinforcement learning approach. IEEE Internet of Things Journal.
16.
go back to reference Muhammad, T., Munir, M. T., Munir, M. Z., & Zafar, M. W. (2022). Integrative cybersecurity: Merging zero trust, layered defense, and global standards for a resilient digital future. International Journal of Computer Science and Technology, 6(4), 99–135. Muhammad, T., Munir, M. T., Munir, M. Z., & Zafar, M. W. (2022). Integrative cybersecurity: Merging zero trust, layered defense, and global standards for a resilient digital future. International Journal of Computer Science and Technology, 6(4), 99–135.
17.
go back to reference HaddadPajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep recurrent neural network based approach for internet of things malware threat hunting. Future Generation Computer Systems, 85, 88–96.CrossRef HaddadPajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep recurrent neural network based approach for internet of things malware threat hunting. Future Generation Computer Systems, 85, 88–96.CrossRef
18.
go back to reference Hembree, M. (2019). Exploring the strategies cybersecurity professionals need to detect insider threats using machine learning methods (Doctoral dissertation, Colorado Technical University). Hembree, M. (2019). Exploring the strategies cybersecurity professionals need to detect insider threats using machine learning methods (Doctoral dissertation, Colorado Technical University).
19.
go back to reference Awotunde, J. B., & Misra, S. (2022). Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks. Illumination of artificial intelligence in cybersecurity and forensics (pp. 21–44). Springer International Publishing.CrossRef Awotunde, J. B., & Misra, S. (2022). Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks. Illumination of artificial intelligence in cybersecurity and forensics (pp. 21–44). Springer International Publishing.CrossRef
20.
go back to reference Keserwani, P. K., Govil, M. C., Pilli, E. S., & Govil, P. (2021). A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. Journal of Reliable Intelligent Environments, 7, 3–21.CrossRef Keserwani, P. K., Govil, M. C., Pilli, E. S., & Govil, P. (2021). A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. Journal of Reliable Intelligent Environments, 7, 3–21.CrossRef
21.
go back to reference Sahu, A. K., Sharma, S., Tanveer, M., & Raja, R. (2021). Internet of things attack detection using hybrid deep learning model. Computer Communications, 176, 146–154.CrossRef Sahu, A. K., Sharma, S., Tanveer, M., & Raja, R. (2021). Internet of things attack detection using hybrid deep learning model. Computer Communications, 176, 146–154.CrossRef
22.
go back to reference Rose, J. R., Swann, M., Grammatikakis, K. P., Koufos, I., Bendiab, G., Shiaeles, S., & Kolokotronis, N. (2022). IDERES: Intrusion detection and response system using machine learning and attack graphs. Journal of Systems Architecture, 131, 102722.CrossRef Rose, J. R., Swann, M., Grammatikakis, K. P., Koufos, I., Bendiab, G., Shiaeles, S., & Kolokotronis, N. (2022). IDERES: Intrusion detection and response system using machine learning and attack graphs. Journal of Systems Architecture, 131, 102722.CrossRef
23.
go back to reference Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76, 7081–7106.CrossRef Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76, 7081–7106.CrossRef
24.
go back to reference Presekal, A., Ştefanov, A., Rajkumar, V. S., & Palensky, P. (2023). Attack graph model for cyber-physical power systems using hybrid deep learning. IEEE Transactions on Smart Grid. Presekal, A., Ştefanov, A., Rajkumar, V. S., & Palensky, P. (2023). Attack graph model for cyber-physical power systems using hybrid deep learning. IEEE Transactions on Smart Grid.
25.
go back to reference Fotohi, R., & Aliee, F. S. (2021). Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Computer Networks, 197, 108331.CrossRef Fotohi, R., & Aliee, F. S. (2021). Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Computer Networks, 197, 108331.CrossRef
26.
go back to reference Borylo, P., Davoli, G., Rzepka, M., Lason, A., & Cerroni, W. (2021). Unified and standalone monitoring module for NFV/SDN infrastructures. Journal of Network and Computer Applications, 175(102934), 1–19. Borylo, P., Davoli, G., Rzepka, M., Lason, A., & Cerroni, W. (2021). Unified and standalone monitoring module for NFV/SDN infrastructures. Journal of Network and Computer Applications, 175(102934), 1–19.
27.
go back to reference Ren, H., Li, H., Liu, D., Xu, G., Cheng, N., & Shen, X. S. (2020). Privacy-preserving efficient verifiable deep packet inspection for cloud-assisted middlebox. IEEE Transactions on Cloud Computing, 10, 1–13. Ren, H., Li, H., Liu, D., Xu, G., Cheng, N., & Shen, X. S. (2020). Privacy-preserving efficient verifiable deep packet inspection for cloud-assisted middlebox. IEEE Transactions on Cloud Computing, 10, 1–13.
31.
go back to reference Ullah, I., & Mahmoud, Q. H. (2020). A scheme for generating a dataset for anomalous activity detection in IoT networks. In C. Goutte & X. Zhu (Eds.), Advances in artificial intelligence. Canadian AI 2020. Lecture Notes in Computer Science (Vol. 12109). Springer. https://doi.org/10.1007/978-3-030-47358-7_52 Ullah, I., & Mahmoud, Q. H. (2020). A scheme for generating a dataset for anomalous activity detection in IoT networks. In C. Goutte & X. Zhu (Eds.), Advances in artificial intelligence. Canadian AI 2020. Lecture Notes in Computer Science (Vol. 12109). Springer. https://​doi.​org/​10.​1007/​978-3-030-47358-7_​52
32.
go back to reference Edris, E. K. K., Aiash, M., & Loo, J. (2021). Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics, 10(13), 1608.CrossRef Edris, E. K. K., Aiash, M., & Loo, J. (2021). Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics, 10(13), 1608.CrossRef
33.
go back to reference Trujillo-Rasua, R. (2021). Secure memory erasure in the presence of man-in-the-middle attackers. Journal of Information Security and Applications, 57(102730), 1–11. Trujillo-Rasua, R. (2021). Secure memory erasure in the presence of man-in-the-middle attackers. Journal of Information Security and Applications, 57(102730), 1–11.
Metadata
Title
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
Authors
Sonam Bhardwaj
Mayank Dave
Publication date
15-02-2024
Publisher
Springer US
Published in
Telecommunication Systems / Issue 4/2024
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-024-01105-w

Other articles of this Issue 4/2024

Telecommunication Systems 4/2024 Go to the issue