A Deep Learning System for Detecting IoT Web Attacks With a Joint Embedded Prediction Architecture (JEPA) | IEEE Journals & Magazine | IEEE Xplore

A Deep Learning System for Detecting IoT Web Attacks With a Joint Embedded Prediction Architecture (JEPA)


Abstract:

The advancement of Internet of Things (IoT) technology has significantly transformed the dynamic between humans and devices, as well as device-to-device interactions. Thi...Show More

Abstract:

The advancement of Internet of Things (IoT) technology has significantly transformed the dynamic between humans and devices, as well as device-to-device interactions. This paradigm shift has led to profound changes in human lifestyles and production processes. Through the interconnectedness of numerous sensors and controllers via networks, the IoT facilitates the seamless integration of humans with diverse devices, leading to substantial economic advantages. Nevertheless, the burgeoning IoT industry and the rapid proliferation of various IoT devices have also introduced a multitude of security vulnerabilities. Cyber attackers frequently exploit cyber attacks to compromise IoT devices, jeopardizing user privacy and property security, thereby posing a grave menace to the overall security of the IoT ecosystem. In this paper, we propose a novel IoT Web attack detection system based on a joint embedded prediction architecture (JEPA), which effectively alleviates the security issues faced by IoT. It can obtain high-level semantic features in IoT traffic data through non-generative self-supervised learning. These features can more effectively distinguish normal data from attack data and help improve the overall detection performance of the system. Moreover, we propose a feature interaction module based on a dual-branch network, which effectively fuses low-level features and high-level features, and comprehensively aggregates global features and local features. Simulation results on multiple datasets show that our proposed system has better detection performance and robustness.
Published in: IEEE Transactions on Network and Service Management ( Volume: 21, Issue: 6, December 2024)
Page(s): 6885 - 6898
Date of Publication: 05 September 2024

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

The advent of the Internet of Things (IoT) era has enabled a large number of sensors and controllers to be connected to each other through the network, and humans can grasp the dynamics of connected devices in real-time and interact with them [1]. In the past ten years, the IoT has been applied in many fields such as electricity, transportation, government departments, and consumption. It realizes efficient communication between humans and all things, and brings more efficient and intelligent production and lifestyle. With the continuous innovation of IoT technology and the wide application of IoT terminal equipment, the world has entered the era of the Internet of Everything (IoE) [2]. The IoE can empower related entities in the network and integrate network intelligence to facilitate more informed decision-making and easy data exchange. Through the distributed ecosystem, it can generate valuable information based on data collected by IoT devices and transform it into actionable insights for businesses, industries, and individuals. As an important support for the digital economy, IoE has promoted the rapid development of industrial digitization and brought new vitality to the economies of all countries in the world [3].

Select All
1.
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Comput. Sci. Rev., vol. 44, May 2022, Art. no. 100467.
2.
O. Vermesan and J. Bacquet, Internet of Things–The Call of the Edge: Everything Intelligent Everywhere. Boca Raton, FL, USA : CRC Press, 2022.
3.
L. D. Williams, “Concepts of digital economy and industry 4.0 in intelligent and information systems,” Int. J. Intell. Netw., vol. 2, pp. 122–129, Sep. 2021.
4.
C. Wang, Z. Cai, and Y. Li, “Sustainable blockchain-based digital twin management architecture for IoT devices,” IEEE Internet Things J., vol. 10, no. 8, pp. 6535–6548, Apr. 2023.
5.
I. Ashraf, “A survey on cyber security threats in IoT-enabled maritime industry,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2677–2690, Feb. 2023.
6.
Z. Li and D. Zhao, “DeepIncept: Diversify performance counters with deep learning to detect malware,” in Proc. 29th Asia South Pac. Design Autom. Conf. (ASP-DAC), 2024, pp. 362–367.
7.
M. Shoaib and M. S. Umar, “URL based phishing detection using machine learning,” in Proc. 6th Int. Conf. Inf. Syst. Comput. Netw. (ISCON), 2023, pp. 1–7.
8.
M. Ibrahim, A. Continella, and A. Bianchi, “AoT-attack on things: A security analysis of IoT firmware updates,” in Proc. IEEE 8th Eur. Symp. Security Privacy (EuroS P), 2023, pp. 1047–1064.
9.
W. B. Shahid, B. Aslam, H. Abbas, S. B. Khalid, and H. Afzal, “An enhanced deep learning based framework for Web attacks detection, mitigation and attacker profiling,” J. Netw. Comput. Appl., vol. 198, Feb. 2022, Art. no. 103270.
10.
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022.
11.
Y. LeCun, “A path towards autonomous machine intelligence version 0.9. 2, 2022-06-27,” Open Rev., vol. 62, no. 1, pp. 1–62, 2022.
12.
A. R. Khan, M. Kashif, R. H. Jhaveri, R. Raut, T. Saba, and S. A. Bahaj, “Deep learning for intrusion detection and security of Internet of Things (IoT): Current analysis, challenges, and possible solutions,” Secur. Commun. Netw., vol. 2022, no. 1, pp. 1–13, Jul. 2022, Art. no. 4016073.
13.
J. Liu, “Deep anomaly detection in packet payload,” Neurocomputing, vol. 485, pp. 205–218, May 2022.
14.
Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Rule generation for signature based detection systems of cyber attacks in IoT environments,” Bull. Netw., Comput., Syst., Softw., vol. 8, no. 2, pp. 93–97, 2019.
15.
V. Visoottiviseth, P. Sakarin, J. Thongwilai, and T. Choobanjong, “Signature-based and behavior-based attack detection with machine learning for home IoT devices,” in Proc. IEEE Reg. 10 Conf. (TENCON), 2020, pp. 829–834.
16.
A. Cirne, P. R. Sousa, J. S. Resende, and L. Antunes, “IoT security certifications: Challenges and potential approaches,” Comput. Security, vol. 116, May 2022, Art. no. 102669.
17.
X. Ren, Y. Hu, W. Kuang, and M. B. Souleymanou, “A Web attack detection technology based on bag of words and hidden Markov model,” in Proc. IEEE 15th Int. Conf. Mobile Ad Hoc Sensor Syst. (MASS), 2018, pp. 526–531.
18.
S. Sharma, P. Zavarsky, and S. Butakov, “Machine learning based intrusion detection system for Web-based attacks,” in Proc. IEEE 6th Int. Conf. Big Data Security Cloud (BigDataSecurity), IEEE Int. Conf. High Perform. Smart Comput.,(HPSC) IEEE Int. Conf. Intell. Data Security (IDS), 2020, pp. 227–230.
19.
Y. An, F. R. Yu, J. Li, J. Chen, and V. C. Leung, “Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT),” IEEE Internet Things J., vol. 8, no. 5, pp. 3554–3566, Mar. 2021.
20.
T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, “Anomaly-based intrusion detection system for IoT networks through deep learning model,” Comput. Elect. Eng., vol. 99, Apr. 2022, Art. no. 107810.
21.
K. Lakshmanna, “A review on deep learning techniques for IoT data,” Electronics, vol. 11, no. 10, p. 1604, 2022.
22.
C. Luo, Z. Tan, G. Min, J. Gan, W. Shi, and Z. Tian, “A novel Web attack detection system for Internet of Things via ensemble classification,” IEEE Trans. Ind. Informat., vol. 17, no. 8, pp. 5810–5818, Aug. 2021.
23.
A. Tekerek, “A novel architecture for Web-based attack detection using convolutional neural network,” Comput. Secur., vol. 100, Jan. 2021, Art. no. 102096.
24.
Y. E. Seyyar, A. G. Yavuz, and H. M. Ünver, “An attack detection framework based on BERT and deep learning,” IEEE Access, vol. 10, pp. 68633–68644, 2022.
25.
S. Pillai and A. Sharma, “Hybrid unsupervised Web-attack detection and classification–a deep learning approach,” Comput. Stand. Interfaces, vol. 86, Aug. 2023, Art. no. 103738.
26.
M. T. A. Nguyen, V. Tong, S. B. Souihi, and S. Souihi, “Deep learning in NLP for anomalous HTTP requests detection,” in Proc. 19th Int. Conf. Netw. Service Manage. (CNSM), 2023, pp. 1–8.
27.
N. Moarref and M. T. Sandıkkaya, “MC-MLDCNN: Multichannel multilayer dilated convolutional neural networks for Web attack detection,” Secur. Commun. Netw., vol. 2023, no. 1, pp. 1–17, Dec. 2023, Art. no. 4016073.
28.
V. Sobal, J. Sv, S. Jalagam, N. Carion, K. Cho, and Y. LeCun, “Joint embedding predictive architectures focus on slow features,” 2022, arXiv:2211.10831.
29.
F. Zareen, M. A. F. Amador, and R. Karam, “Hardware immune system for embedded IoT,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 69, no. 10, pp. 4118–4122, Oct. 2022.
30.
M. Assran, “Self-supervised learning from images with a joint-embedding predictive architecture,” 2023, arXiv:2301.08243.

Contact IEEE to Subscribe

References

References is not available for this document.