IoT Network based Cyber Attack Mitigation in Digital Twin with Multi Level Key Management Using Enhanced KNN Model

Authors

  • Valluri. Padmapriya Research Scholar, Department of Computer Science-GITAM School of Science, GITAM Deemed to be University Visakhapatnam, Andhra Pradesh, India, Assistant Professor, Bhavan’s Vivekananda College, Secunderabad, Telangana, India
  • Muktevi Srivenkatesh Associate Professor, Department of Computer Science-GITAM School of Science, GITAM Deemed to be University Visakhapatnam, Andhra Pradesh, India

Keywords:

Internet of Things, Digital Twins, Cyber Physical Systems, Cryptography, Network Attacks, Key Management, Virtual Object, K Nearest Neighbor, Authentication, Security

Abstract

Internet of Things (IoT) technology have already been ingrained in many aspects of daily life, including public health, smart vehicles, smart grids, smart cities, smart manufacturing, and smart homes, with the number of Internet-connected devices estimated to reach about 30 billion by 2030. As a result, businesses began adopting and refining Digital Twin (DT) solutions. There are many security threats that will affect DTs despite their usefulness in enabling IoT systems. IoT devices with limited resources are more vulnerable to brute-force attacks, which can then be used as part of a botnet to launch cyber attacks. The increased likelihood of a large-scale cyber attack is compounded by the difficulty in preventing the transmission of malicious scripts to other devices while the botnet is still forming. Knowledge-driven open-source digital twin technologies of industrial control systems are selected after careful consideration of their implementation details. This digital twin is used by the cyber security analysis method to simulate various process-aware attack scenarios and produce a training dataset that reflects the process's measurements during both normal and attack operations. In a perfect world, Digital Twins would each have their own cryptographic identity separate from the host system to avoid attacks. In the actual world of industry, digital twins often operate in shady settings. Systems that mimic a significant part of the functionality of the device being twined fall into this category, but analytical methods also play a role. If an attacker wants to compromise the system's functioning including the Digital Twin, they need to have a thorough understanding of the target system. The suggested architecture also incorporates a cyber attack detection system that uses machine learning model. Critical systems benefit greatly from having a digital twin. However, digital twins also have applications in cyber security and safety. Cryptography enabled Multi Level Key Management using Enhanced K-Nearest Neighbor (CMLKM-EKNN) model that generates a key set in the IoT network for making strong authentication is proposed in this research. The proposed model key set contains key pairs that can be used for only one time to avoid attackers to reuse the keys for attacking the network. The EKNN model identifies the neighbor nodes, perform analysis and allocate weights to the features for attack detection in the network. A digital twin-based paradigm to aid in improving the cyber security of Cyber Physical Systems (CPSs) is proposed. Based on the strategy, the digital twin system can secure the CPSs. The proposed model when compared to the traditional model provides better security levels in the IoT Network.

Downloads

Download data is not yet available.

References

B. Sousa, M. Arieiro, V. Pereira, J. Correia, N. Lourenço and T. Cruz, "ELEGANT: Security of Critical Infrastructures With Digital Twins," in IEEE Access, vol. 9, pp. 107574-107588, 2021, doi: 10.1109/ACCESS.2021.3100708.

P. Kumar, R. Kumar, A. Kumar, A. A. Franklin, S. Garg and S. Singh, "Blockchain and Deep Learning for Secure Communication in Digital Twin Empowered Industrial IoT Network," in IEEE Transactions on Network Science and Engineering, vol. 10, no. 5, pp. 2802-2813, 1 Sept.-Oct. 2023, doi: 10.1109/TNSE.2022.3191601.

A.Khan, F. Shahid, C. Maple, A. Ahmad and G. Jeon, "Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain," in IEEE Transactions on Industrial Informatics, vol. 18, no. 2, pp. 1359-1366, Feb. 2022, doi: 10.1109/TII.2020.3047840.

Z. Q. Wang and A. El Saddik, "DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models," in IEEE Access, vol. 11, pp. 114013-114030, 2023, doi: 10.1109/ACCESS.2023.3324371.

J. Wu, Y. Wang, H. Dai, C. Xu and K. B. Kent, "Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection," in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13205-13220, 1 Aug.1, 2023, doi: 10.1109/JIOT.2023.3262458.

J. Wu, H. Dai, Y. Wang, K. Ye and C. Xu, "Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach," in IEEE Internet of Things Journal, vol. 10, no. 12, pp. 10764-10777, 15 June15, 2023, doi: 10.1109/JIOT.2023.3239872.

J. Liu, D. Yang, M. Lian and M. Li, "Research on Intrusion Detection Based on Particle Swarm Optimization in IoT," in IEEE Access, vol. 9, pp. 38254-38268, 2021, doi: 10.1109/ACCESS.2021.3063671.

M. Zeeshan et al., "Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets," in IEEE Access, vol. 10, pp. 2269-2283, 2022, doi: 10.1109/ACCESS.2021.3137201.

M. Eskandari, Z. H. Janjua, M. Vecchio and F. Antonelli, "Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices," in IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6882-6897, Aug. 2020, doi: 10.1109/JIOT.2020.2970501.

A.Oseni et al., "An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 1, pp. 1000-1014, Jan. 2023, doi: 10.1109/TITS.2022.3188671.

G. Prettico, M. G. Flammini, N. Andreadou, S. Vitiello, G. Fulli and M. Masera, "Distribution system operators observatory 2018—Overview of the electricity distribution system in Europe", 2019.

C. Foglietta, D. Masucci, C. Palazzo, R. Santini, S. Panzieri, L. Rosa, et al., "From detecting cyber-attacks to mitigating risk within a hybrid environment", IEEE Syst. J., vol. 13, no. 1, pp. 424-435, Mar. 2019.

V. Graveto, L. Rosa, T. Cruz and P. Simões, "A stealth monitoring mechanism for cyber-physical systems", Int. J. Crit. Infrastruct. Protection, vol. 24, pp. 126-143, Mar. 2019.

Xu, Qinghua et al. “Digital Twin-based Anomaly Detection in Cyber-physical Systems.” 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST) (2021): 205-216.

Z. Wu, H. Zhang, P. Wang, and Z. Sun, “RTIDS: A robust transformer-based approach for intrusion detection system,” IEEE Access, vol. 10, pp. 64375–64387, 2022.

R. Nasir, M. Afzal, R. Latif, and W. Iqbal, “Behavioral based insider threat detection using deep learning,” IEEE Access, vol. 9, pp. 143266–143274, 2021.

B. Sharma, P. Pokharel, and B. Joshi, “User behavior analytics for anomaly detection using LSTM autoencoder–insider threat detection,” in Proc. 11th Int. Conf. Adv. Inf. Technol., Jul. 2020, pp. 1–9.

W. Huang, H. Zhu, C. Li, Q. Lv, Y. Wang, and H. Yang, “ITDBERT: Temporal-semantic representation for insider threat detection,” in Proc. IEEE Symp. Comput. Commun. (ISCC), Sep. 2021, pp. 1–7.

F. Meng, F. Lou, Y. Fu, and Z. Tian, “Deep learning based attribute classification insider threat detection for data security,” in Proc. IEEE 3rd Int. Conf. Data Sci. Cyberspace (DSC), Jun. 2018, pp. 576–581.

M. Singh, B. M. Mehtre, and S. Sangeetha, “User behavior profiling using ensemble approach for insider threat detection,” in Proc. IEEE 5th Int. Conf. Identity, Secur., Behav. Anal. (ISBA), Jan. 2019, pp. 1–8.

D. Sun, M. Liu, M. Li, Z. Shi, P. Liu, and X. Wang, “DeepMIT: A novel malicious insider threat detection framework based on recurrent neural network,” in Proc. IEEE nt. Conf. Comput. Supported Cooperat. Work Design (CSCWD), May 2021, pp. 335–341.

F. Liu, Y. Wen, D. Zhang, X. Jiang, X. Xing, and D. Meng, “Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Nov. 2019, pp. 1777–1794.

X. Larriva-Novo, V. A. Villagrá, M. Vega-Barbas, D. Rivera and M. S. Rodrigo, "An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets", Sensors, vol. 21, no. 2, pp. 656, Jan. 2021, [online] Available: https://www.mdpi.com/1424-8220/21/2/656.

S. I. Popoola, B. Adebisi, R. Ande, M. Hammoudeh, K. Anoh and A. A. Atayero, "SMOTE-DRNN: A deep learning algorithm for botnet detection in the Internet-of-Things networks", Sensors, vol. 21, no. 9, pp. 2985, Apr. 2021, [online] Available: https://www.mdpi.com/1424-8220/21/9/2985.

A.Churcher, R. Ullah, J. Ahmad, S. ur Rehman, F. Masood, M. Gogate, et al., "An experimental analysis of attack classification using machine learning in IoT networks", Sensors, vol. 21, no. 2, pp. 446, Jan. 2021, [online] Available: https://www.mdpi.com/1424-8220/21/2/446.

Y. Yang, K. Zheng, C. Wu and Y. Yang, "Improving the classification effectiveness of intrusion detection by using improved conditional variational AutoEncoder and deep neural network", Sensors, vol. 19, no. 11, pp. 2528, Jun. 2019, [online] Available: https://www.mdpi.com/1424-8220/19/11/2528.

M. Shafiq, Z. Tian, A. K. Bashir, X. Du and M. Guizani, "CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques", IEEE Internet Things J., vol. 8, no. 5, pp. 3242-3254, Mar. 2021.

N. Guizani and A. Ghafoor, "A network function virtualization system for detecting malware in large IoT based networks", IEEE J. Sel. Areas Commun., vol. 38, no. 6, pp. 1218-1228, Jun. 2020.

O. Alkadi, N. Moustafa, B. Turnbull and K.-K.-R. Choo, "A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks", IEEE Internet Things J., vol. 8, no. 12, pp. 9463-9472, Jun. 2021.

M. Ahmad, Q. Riaz, M. Zeeshan, H. Tahir, S. A. Haider and M. S. Khan, "Intrusion detection in Internet of Things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set", EURASIP J. Wireless Commun. Netw., vol. 2021, no. 1, pp. 1-23, Dec. 2021.

Downloads

Published

02.02.2024

How to Cite

Padmapriya, V., & Srivenkatesh, M. . (2024). IoT Network based Cyber Attack Mitigation in Digital Twin with Multi Level Key Management Using Enhanced KNN Model . International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 49–62. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4635

Issue

Section

Research Article