Abstract

By combining the Internet of Things (IoT) and Artificial Intelligence (AI), new augmentations and enhancements are realized, resulting in environment-aware systems that can enable intelligent decision making, with one such example being smart satellite networks. However, smart satellite networks attract the attention of hackers, resulting in them being targeted by severe cyber-attacks that can compromise their integrity, affect their availability, or breach the confidentiality of the data they generate, collect or rout. Lately, several prominent cyber-attacking scenarios have been observed to target IoT-enabled systems, resulting in loss, alteration, or exfiltration of data, disabling of devices, (distributed) denial of services, the formation of botnets, and lateral movement into otherwise secured networks. In this paper, we propose a network forensic framework based on Deep Learning (DL), the so-called Intelligent Satellite Deep Learning Network Forensic (INSAT-DLNF), for the detection and tracing of cyber-attack activities targeting smart satellite networks. For this framework, we trained a Long Short-term Memory Recurrent Neural Network (LSTM-RNN) and Gated Recurrent Unit (GRU) and compared their performances to five supervised and two unsupervised Machine Learning (ML) algorithms. The experimental results indicate that ML and DL algorithms can be employed effectively for the discovery and tracing of cyber-attacks, resulting in more adaptive and resilient cyber-security solutions, compared to legacy forensic tools that cannot discover zero-day attack surfaces and vectors.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.