Abstract

The Internet of Things (IoT) encompasses multiple fast-emerging technologies controlling and connecting millions of new devices every day in several application domains. The increased number of interconnected IoT devices, their limited computational power, and the evolving sophistication of cyber security threats, results in increased security challenges for the IoT ecosystem. The diversity of IoT devices, and the variety of QoS requirements among several domains of IoT application, impose considerable challenges in designing and implementing a robust IoT security solution. The aim of this paper is to present an efficient, robust, and easy-to-use system, for IoT cyber security operators. Following a by-design security approach, the proposed system is a platform comprising four distinct yet cooperating components; a distributed AI-enhanced detection of potential threats and anomalies mechanisms, an AI-based generation of effective mitigation strategies according to the severity of detected threats, a system for the verification of SDN routing decisions along with network- and resource-related policies, and a comprehensive and intuitive security status visualization and analysis. The distributed anomaly detection scheme implementing multiple AI-powered agents is deployed across the IoT network nodes aiming to efficiently monitor the entire network infrastructure. Network traffic data are fed to the AI agents, which process consecutive traffic samples from the network in a time series analysis manner, where consecutive time windows framing the traffic of the surrounding nodes are processed by a graph neural network algorithm. Any detected anomalies are handled by a mitigation engine employing a distributed neural network algorithm, which exploits the recorded anomalous events and deploys appropriate responses for optimal threat mitigation. The implemented platform also includes the hypothesis testing module, and a multi-objective optimization tool for the quick verification of routing decisions. The system incorporates visualization and analytics functionality and a customizable user interface.

Highlights

  • During the last decade, the Internet of Things (IoT) emerged as the big wave of innovation, with unlimited possibilities for changing the way people live

  • For the scenario examined for the validation of the mitigation engine, it is assumed that network is threatened by multiple attacks and some of the network components are already affected by malicious software

  • It is assumed that the anomaly detection component detects anomalies in the traffic of the following 41 devices: four routing controllers using the Open Network Operating System (ONOS), six virtual switches using the Open vSwitch, 20 IP cameras, 10 temperature control sensors and 1 server operating with Windows 10

Read more

Summary

Introduction

The Internet of Things (IoT) emerged as the big wave of innovation, with unlimited possibilities for changing the way people live. Initiated from the interconnection of RFID devices, it is estimated that the number of connected objects exceeded the number of people connected to the Internet in the late 2010s. In 2020, the evolution of IoT led to an installed basis of 20 billion interconnected devices globally [1]. Ericsson predicts that global revenue of the communications service provider IoT will increase at a combined annual growth rate of 24.9% until 2023 [2]. In 2020, 1.5 billion IoT devices were connected via cellular 3GPP (3rd Generation Partnership Project) access technologies. This figure will reach 5 billion by 2025

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call