Abstract

The Internet of Things (IoT) has rapidly transformed digital environments across a multitude of domains with increased connectivity and pervasive virtualization. The distributed computing paradigm of Edge Computing has been postulated to overcome the concerns of response time, bandwidth, energy consumption, and cybersecurity. In comparison to the other concerns, limited studies have focused on cybersecurity, mainly due to the inherent complexity of threat detection at the Edge. However, the widespread adoption of IoT applications in economic, social, and political contexts is a stringent indication of the significant impact from cyber-attacks. This paper aims to address this challenge by presenting an effective and efficient machine learning approach for threat detection at the Edge of IoT. The novel contributions of this approach are, a new Enhanced Geometric Synthetic Minority Oversampling Technique (EG-SMOTE) algorithm to resolve the imbalanced distribution of data streams at the IoT Edge, an extension to the Growing Self Organizing Map (GSOM) algorithm based on Hyperdimensional Computing for energy efficient machine learning from unlabeled data streams. The proposed EG-SMOTE + GSOM approach has been tested using four open access datasets; three benchmark, KDD99 (F-Score = 0.9360), NSL-KDD (F-Score = 0.9647), CICIDS2017 (F-Score = 0.9999), and one industry-focused botnet IoT traffic dataset, BoT-IoT (F-Score = 0.9445). The EG-SMOTE approach has outperformed SMOTE and G-SMOTE approaches in a vast number of experiments that are tried with different classifiers. The results of these experiments confirm the novelty, efficiency and effectiveness of this approach for cybersecurity at the IoT Edge.

Highlights

  • IntroductionThe Internet of Things Edge (IoT Edge) has enabled computation and storage in end-user proximity, decreased transmission latency, and reduced network bandwidth requirements, leading to efficiencies in response time, resource utilization and end-user outcomes [2],[3]

  • Edge Computing is primed to address the challenges of Internet of Things applications that are being developed and deployed in complex real-world settings [1]

  • The classifier based on Growing Self Organizing Map (GSOM) performs considerably well, compared to existing classifiers, which confirms its utility in Internet of Things (IoT) Edge applications

Read more

Summary

Introduction

The Internet of Things Edge (IoT Edge) has enabled computation and storage in end-user proximity, decreased transmission latency, and reduced network bandwidth requirements, leading to efficiencies in response time, resource utilization and end-user outcomes [2],[3]. This has been significant for real-time IoT Edge applications in energy management, smart factories, and digital healthcare [4], [5]. A cybersecurity attack on an IoT Edge application is a breach on the integrity of its structure, function, and operations, impacting both

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.