Detection of Cyber Attacks On IoT Based Cyber Phys
Detection of Cyber Attacks On IoT Based Cyber Phys
Detection of Cyber Attacks On IoT Based Cyber Phys
1051/matecconf/202439201166
ICMED 2024
1 Introduction
In recent years, the proliferation of the Internet of Things (IoT) has become
increasingly pervasive in the real world. Growing concerns about the security and
privacy of networks are prevalent today, with a heightened emphasis on system safety
measures due to the expanding role of information technology in daily life. The evolution
of various Internet applications and the emergence of advanced technologies, such as the
*
Corresponding author: [email protected]
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative
Commons Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/).
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
Internet of Things (IoT), have sparked new endeavors aimed at compromising machine
networks and computer systems. The IoT, comprising interconnected objects and smart
devices operating without direct human intervention, has witnessed a surge in development.
Many smart IoT devices are equipped with sensors that facilitate internet connectivity,
enabling the exchange of information across various nodes, spanning applications in
healthcare, agriculture, transportation, and more[1]. The deployment of IoT devices is
driven by the desire to streamline processes, conserve time and resources, and revolutionize
work practices. The IoT not only offers numerous advantages but also presents extensive
possibilities for information exchange, customization, and expansion.
Security threats are pervasive on the internet and within the Internet of Things (IoT), as the
cyberspace serves as the central hub for IoT systems. Unlike the traditional internet, IoT
junctions face limitations in terms of capacity and resources, often relying on manual
commands. The rapid integration of IoT smart devices into daily life has made it
challenging to identify and address IoT security issues, necessitating the implementation of
network-based security solutions[2]. While modern techniques are employed to detect
certain cyber attacks, the identification of others remains a more formidable challenge. The
escalating prevalence of network cyber-attacks emphasizes the need for more advanced and
efficient techniques in cyber attack detection. Machine Learning algorithms are
instrumental in enhancing the intelligence of IoT networks, with Machine Learning (ML)
recognized as a powerful computational model. ML methods find applications in various
network security tasks, including intrusion detection, network traffic analysis, and bot-net
recognition, thereby contributing significantly to the improvement of network safety
Machine Learning (ML) can be defined as the capacity of an intelligent device to adapt its
behavior and state based on acquired knowledge, constituting a crucial component of
solutions within the Internet of Things (IoT) paradigm. ML has the capability to extract
valuable insights from both machine-generated and human-generated data, enabling its
application in diverse tasks like classification and regression. Furthermore, ML plays a
significant role in providing security services within IoT networks[3]. The use of ML in
addressing challenges related to cyber attack detection has emerged as a prominent and
evolving area, contributing to various applications in the cybersecurity domain. While
several research studies have employed ML methods to identify effective techniques for
detecting threats, limited groundwork exists specifically tailored to the unique
characteristics of IoT environments within the broader field of cyber-physical systems.
Machine Learning (ML) can be employed for the task of cyber attack detection through two
primary categories of cyber-analysis: misuse-based techniques, utilizing signatures, and
anomaly-based techniques. Misuse-based methods aim to identify known cyber attacks by
analyzing specific properties within cyber traffic, often referred to as "signatures" in
contemporary cyber-attacks. Detection using these methods offers advantages, such as the
ability to identify recognized cyber attacks accurately without generating a significant
number of false positives[4].
2 Literature Review
Manal Abdullah Alohali et al[5] , In the pursuit of facilitating remote access, surveillance,
and analysis, Cyber-Physical Systems (CPSs) commonly integrate networks, making them
susceptible to cyber attacks arising from the presence of insecure networking devices. The
violation of internet security by attackers can disrupt system functions, resulting in severe
consequences. The integration of Fog with the Internet of Things (IoT) presents a potential
solution, enabling quicker attack detection compared to cloud-based CPS. However, the
2
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
3
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
threat to both Internet services and cyber-physical systems linked to the Internet. The
existing vulnerabilities in billions of IoT devices make them susceptible to compromise,
particularly in the context of emerging threats such as the Mongolian Distributed Denial of
Service (DDoS) attack, characterized by its widely distributed nature and small attack size
from each source. The proposed anomaly-based Intrusion Detection System (IDS) aims to
timely detect and mitigate this stealthy form of DDoS attack. However, certain limitations
must be acknowledged. The generalizability of the proposed IDS may be influenced by the
specifics of the experiments, and further exploration across diverse scenarios and datasets
is necessary. Additionally, while the proposed IDS demonstrates effectiveness in detecting
and mitigating stealthy DDoS attacks with very low attack sizes per source, real-world
implementation and scalability considerations remain areas for further investigation.
Prabhakar Krishnan et al[9] . In response to the growing prominence of Internet of
Things (IoT) devices in contemporary networks and Industry 4.0, this study introduces a
software- defined framework aimed at enhancing network intrusion detection systems
through the incorporation of manufacturer usage description (MUD) for improved
behavioral monitoring in IoT networks. The goal is to investigate whether Industrial IoT
(IIoT) devices, common in cyber- physical systems, exhibit predictable communication
patterns that can be formally defined in MUD profiles. The framework leverages digital
twins and software-defined networking to fortify the security of IIoT environments,
profiling MUD data and evaluating actions on the network digital twin before
implementation in the physical network. While the proposed system demonstrates
significant advancements in attack detection accuracy, incident prediction, response time,
and resource usage compared to existing approaches, certain limitations must be
acknowledged. The efficacy of the framework may be influenced by specific IIoT
deployment scenarios and network configurations, necessitating further validation across
diverse environments. Additionally, real-world implementation challenges and scalability
considerations need to be addressed for comprehensive applicability.
3 Proposed Methodology
The main problem addressed in this research is the evolving nature of cyber threats in IoT-
based Cyber-Physical Systems (CPS) and the limitations associated with the existing cyber
attack detection system that relies on Support Vector Machine (SVM) models. While the
SVM model has shown effectiveness in binary classification tasks and has been trained on
historical data to identify normal and malicious behavior patterns in IoT devices, its
performance is impacted by the dynamic and evolving nature of cyber threats. This leads to
issues in detection accuracy. To address these limitations, the research proposes a novel
deep learning-based Convolutional Neural Network (CNN) model for cyber threat
detection in IoT-based CPS. The goal is to improve the overall performance metrics,
including accuracy, precision, recall, and f1-score, thereby enhancing the system's ability to
detect and mitigate a broader range of cyber threats.
4
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
5
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
includes convolutional layers to capture spatial patterns in the data, followed by pooling
layers for dimensionality reduction. Additional fully connected layers enable the network to
learn intricate relationships between features. The proposed model is trained using a
labeled dataset to distinguish normal network behavior from cyber attacks. To enhance
generalization, techniques such as dropout and batch normalization may be employed. The
performance is evaluated on a separate test set, and fine-tuning can be performed based on
the results. The CNN-based approach leverages the inherent capabilities of deep learning to
automatically discern patterns in network traffic data, making it well-suited for effective
cyber attack detection in the context of the IoT network cyber physical systems.
5 Result Analysis
The implementation a Convolutional Neural Network (CNN) model for cyber attack
detection using the UNSW-NB15 dataset in Python, a comprehensive environment can be
set up. Utilizing popular libraries like TensorFlow or PyTorch for deep learning, along with
scikit-learn for data preprocessing and evaluation, establishes a robust foundation. Pandas
can be employed to handle and manipulate the dataset, while Matplotlib or Seaborn aids in
visualizing key insights. Jupyter Notebooks provide an interactive environment for
development and experimentation. Additionally, tools such as Anaconda or virtual
environments help manage dependencies. Lastly, leveraging specialized packages like
Keras for high-level neural network abstractions streamlines CNN model implementation.
This combined Python environment offers flexibility, scalability, and ease of use,
facilitating the seamless creation, training, and evaluation of CNN models for cyber attack
detection using the UNSW-NB15 dataset.
The UNSW-NB15 dataset is a comprehensive cyber attacks dataset designed for evaluating
and developing cyber attacks detection systems. It encompasses a diverse range of network
attacks, totaling nine different types, such as Denial of Service (DoS), worms, Backdoors,
and Fuzzers. These attacks represent various cyber threats that can compromise network
security. The dataset is particularly valuable for training and testing cyber detection models
due to its inclusion of raw network packets, providing a detailed representation of network
traffic patterns during both normal and attack scenarios. In terms of dataset size, the
training set consists of 175,341 records, allowing for extensive model training, while the
testing set comprises 82,332 records. The inclusion of both attack and normal instances in
the dataset enables the development of robust intrusion detection models capable of
accurately distinguishing malicious activities from regular network behavior. Researchers
and practitioners can leverage this dataset to explore and implement advanced machine
learning and deep learning techniques for the detection and classification of network
intrusions, contributing to the enhancement of cybersecurity measures.
6
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
its overall generalization capabilities. Some of the standard performance metrics include:
Accuracy
The proportion of correctly classified instances, calculated as (True Positives + True
Negatives) / Total.
Precision
The ability of the model to correctly identify instances of a specific class (e.g.,
attacks), calculated as True Positives / (True Positives + False Positives).
Recall
The ability of the model to capture all instances of a specific class, calculated as True
Positives / (True Positives + False Negatives).
F1-Score
The harmonic mean of precision and recall, providing a balanced measure of a
model's performance, calculated as 2 * (Precision * Recall) / (Precision + Recall).
Table 1 Performances Comparison
Algorithm Accuracy Precision Recall F-Score
Name
The "Accuracy" column represents the overall proportion of correctly classified instances,
where the CNN outperforms the SVM significantly with an accuracy of 99.45% compared
to 86.01%. "Precision" reflects the model's ability to correctly identify instances of a
specific class, and the CNN demonstrates superior precision at 99.35% compared to SVM's
87.66%. "Recall" (or sensitivity) measures the ability to capture all instances of a particular
class, where CNN excels with a recall of 99.39% compared to SVM's 80.08%. Lastly, the
"F-Score" column, which considers both precision and recall, underscores the CNN's
overall strong performance at 99.37% compared to SVM's 82.44%. The table succinctly
illustrates the superior intrusion detection capabilities of the CNN algorithm on the UNSW-
NB15 dataset.
The "Accuracy" column represents the overall proportion of correctly classified instances,
where the CNN outperforms the SVM significantly with an accuracy of 99.45% compared
to 86.01%. "Precision" reflects the model's ability to correctly identify instances of a
specific class, and the CNN demonstrates superior precision at 99.35% compared to SVM's
87.66%. "Recall" (or sensitivity) measures the ability to capture all instances of a particular
class, where CNN excels with a recall of 99.39% compared to SVM's 80.08%. Lastly, the
"F-Score" column, which considers both precision and recall, underscores the CNN's
overall strong performance at 99.37% compared to SVM's 82.44%. The table succinctly
illustrates the superior intrusion detection capabilities of the CNN algorithm on the UNSW-
NB15 dataset.
7
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
Performance
1 Comparision
2
0
1
0
0 SV
M
8
CN
2
0
Each algorithm is represented by a distinct color or pattern on the graph. The x-axis denotes
the different evaluation metrics (Accuracy, Precision, Recall, F-Score), while the y-axis
represents the corresponding metric values as percentages. Vertical bars or line plots for
SVM and CNN
highlight the values for each metric, providing a clear visual comparison of their
performance. The graph visually emphasizes the substantial superiority of the CNN
algorithm across all metrics, particularly showcasing its remarkable accuracy, precision,
recall, and F-score compared to SVM. This visual representation facilitates a quick and
comprehensive understanding of the algorithms' relative strengths in the context of
intrusion detection on the UNSW-NB15 dataset.
6 Conclusion
The integration of Internet of Things (IoT) devices into Cyber-Physical Systems (CPS)
highlights the critical need for robust cyber attack detection systems. The existing research
has focused on leveraging Support Vector Machine (SVM) models for this purpose,
demonstrating their effectiveness in binary classification tasks through training on
historical data. This SVM- based system proves successful in identifying various cyber
threats in both real-world experiments and simulations. However, the research
acknowledges the limitations inherent in the SVM model, particularly its susceptibility to
the dynamic nature of evolving cyber threats and accuracy issues related to historical data
reliance. In response to these challenges, the current study proposes a novel deep learning-
based Convolutional Neural Network (CNN) model. The proposed model aims to enhance
cyber attack detection and performance metrics, outperforming the previous SVM-based
approach. Performance metrics such as accuracy, precision, recall, and F1-score are used to
evaluate the proposed model, demonstrating its superiority and addressing the limitations of
the existing cyber threat detection model. This shift towards a deep learning approach
represents a promising advancement in strengthening the security of IoT-based CPS,
8
MATEC Web of Conferences 392, 01166 (2024) https://doi.org/10.1051/matecconf/202439201166
ICMED 2024
offering improved adaptability and efficacy in the face of evolving cyber threats.
References
1. Malathi, C. and Padmaja, I.N., 2023. Identification of cyber attacks using machine
learning in smart IoT networks. Materials Today: Proceedings, 80, pp.2518-2523.
2. Jahromi, A.N., Karimipour, H., Dehghantanha, A. and Choo, K.K.R., 2021. Toward
detection and attribution of cyber-attacks in IoT-enabled cyber–physical systems. IEEE
Internet of Things Journal, 8(17), pp.13712-13722.
3. Koroniotis, N., Moustafa, N., Sitnikova, E. and Turnbull, B., 2019. Towards the
development of realistic botnet dataset in the internet of things for network forensic
analytics: Bot-iot dataset. Future Generation Computer Systems, 100, pp.779-796.
4. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D. and
Elovici, Y., 2018. N-baiot—network-based detection of iot botnet attacks using deep
autoencoders. IEEE Pervasive Computing, 17(3), pp.12-22.
5. Alohali, M.A., Elsadig, M., Al-Wesabi, F.N., Al Duhayyim, M., Hilal, A.M. and
Motwakel, A., 2023. Swarm intelligence for IoT attack detection in fog-enabled cyber-
physical system. Computers and Electrical Engineering, 108, p.108676.
6. Dalal, S., Lilhore, U.K., Faujdar, N., Simaiya, S., Ayadi, M., Almujally, N.A. and
Ksibi, A., 2023. Next-generation cyber attack prediction for IoT systems: leveraging
multi-class SVM and optimized CHAID decision tree. Journal of Cloud Computing,
12(1), p.137.
7. Al-Hamadi, H., Chen, R., Wang, D.C. and Almashan, M., 2020. Attack and defense
strategies for intrusion detection in autonomous distributed IoT systems. IEEE Access,
8, pp.168994-169009.
8. Doshi, K., Yilmaz, Y. and Uludag, S., 2021. Timely detection and mitigation of
stealthy DDoS attacks via IoT networks. IEEE Transactions on Dependable and Secure
Computing, 18(5), pp.2164-2176.
9. Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M. and Song, H.,
2021. MUD-based behavioral profiling security framework for software-defined IoT
networks. IEEE Internet of Things Journal, 9(9), pp.6611-6622.