

Enhancing Network Forensic and Deep Learning Mechanism for Internet of Things Networks
The integration of intelligence into everyday products has been possible due to the ongoing shrinking of hardware and a rise in power efficiency. The Internet of Things (IoT) area arose from the tendency to add computational capabilities to so-called non-intelligent daily items. IoT systems are attractive targets for cyber-attacks because they have many applications. Adversaries use a variety of Advanced Persistent Threat (APT) strategies and trace the source of cyber-attack events to safeguard IoT networks. The Particle Deep Framework (PDF), which is proposed in this study, is a novel Network Forensics (NF) that encompasses the digital investigative phases for spotting & tracing attack activity in IoT networks. The suggested framework containsthree novel functionalities for dealing with encrypted networks, such as collecting network data flows & confirming their integrity, using a PSO algorithm, "Bot-IoT"& "UNSW NB15" datasets. The suggested PDF is related to several deep-learning methods. Experimental outcomes show that the proposed framework is very good at discovering & tracing cyber-attack occurrences when compared to existing approaches. The proposed design is implemented using neural network technology. The proposed design has 10% accuracy when compared with the existing structure. This paper is expected to offer a quick reference for researchers interested in understanding the use of network forensics and IOT.
Keywords
Attack Tracing, Botnets, IOT, Network Forensics, Particle Swarm Optimization.
User
Font Size
Information
- Koroniotis N & Moustafa N, Enhancing network forensics with particle swarm and deep learning: The particle deep framework, arXiv preprint arXiv:2005.00722(2020).
- Koroniotis N, Moustafa N & Sitnikova E, Forensics and deep learning mechanisms for botnets in the internet of things: A survey of challenges and solutions, IEEE Access, 7(2019) 61764–61785.
- Ronen E, Shamir A, Weingarten A O & O'Flynn C, IoT goes nuclear: Creating a ZigBee chain reaction, 2017 IEEE Symposium on Security and Privacy(IEEE), 2017.
- Meffert C, Clark D, Baggili I & Breitinger F, Forensic state acquisition from internet of things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition, Proc 12 th Int Conf Avail Reliability, and Security(2017), https://doi.org/10.1145/ 3098954.3104053.
- Raghunath K K M, Koti M S, Sivakami R, Kumar V V, NagaJyothi G & Muthukumaran V, Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management, Int J Syst Assur Eng Manag (2022) 1–7, https://doi.org/10.1007/ s13198-021-01585-y.
- Hassan M A, Samara G & Fadda M A, IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study, arXiv preprint arXiv:2203.15705 (2022).
- Hossain M, Karim Y & Hasan R, FIF-IoT: A forensic investigation framework for IoT using a public digital ledger, 2018 IEEE Int Cong Internet Things (IEEE) 2018.
- Hossain M, Hasan R & Zawoad S, Probe-IoT: A public digital ledger based forensicinvestigation framework for IoT, IEEE INFOCOM 2018 - IEEE Conf Comput Commun Workshops (Honolulu, HI, USA) 2018, 1–2, doi: 10.1109/INFCOMW.2018.8406875.
- Shone N, Ngoc T N, Phai V D & Shi Q, A deep learning approach to network intrusion detection, IEEE Trans Emerg Topics Comput, 2(1)(2018) 41–50.
- Prabakaran S & Mitra S, Survey of analysis of crime detection techniques using data mining and machine learning, J Phys Conf Ser(IOP Publishing) 1000(1) (2018).
- Koroniotis N, Moustafa N,Sitnikova E & Turnbull B, Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset, Future Gener Comput Syst, 100(2019) 779–796.
- Moustafa N & Slay J, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Commun Inf Syst Conf (IEEE) 2015.
- Cebe M, Erdin E, Akkaya K, Aksu H & Uluagac S, Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles, IEEE Commun Magaz, 56(10)(2018) 50–57.
- Babun L, Sikder A K,Acar A & Uluagac A S, Iotdots: A digital forensics framework for smart environments, arXiv preprint arXiv:1809.00745(2018).
- Yuan X, Li C & Li X, DeepDefense: identifying DDoS attack via deep learning, 2017 IEEE Int Conf Smart Comput (IEEE) 2017.
- Brun O, Yin Y, Gelenbe E, Kadioglu Y M, Augusto-Gonzalez J & Ramos M, Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments, in Security in Computer and Information Sciences, Euro-CYBERSEC 2018, (Springer International Publishing London, UK) 2018, 79–89.https://doi.org/ 10.1007/978-3-319-95189-8_8
- Kennedy J & Eberhart R, Particle swarm optimization, Proc ICNN'95- IEEE Int Conf Neural Netw(IEEE) 1995, 1942–1948, DOI: 10.1109/ICNN.1995.488968
- Wang D, Tan D & Liu L, Particle swarm optimization algorithm: an overview, Soft Comput, 22(2)(2018) 387–408.
- Parsopoulos K E, Particle Swarm Methods, in Handbook of Heuris, edited by R Martí, P Panos & M Resende (Springer Cham) 2015, DOI 10.1007/978-3-319-07153-4_22-1.
- Elbagoury M B, Maskeliunas R & Salem A B M M, A Hybrid Liar/Radar-based deep learning and vehicle recognition engine for autonomous vehicle pre-crash control,East-Eur J Enterp Technol, 5(9)(2018) 6–17, 10.15587/1729-4061.2018.141298.
- Zhao T, Ekim Y, Joel P & Giorgio R, Automated vehicle safety guarantee, verification and certification: A survey, arXiv preprint arXiv:2202.02818 (2022).
- Dequaire, Julie, Deep tracking in the wild: End-to-end tracking using recurrent neural networks, Int J Robot Res, 374(5)(2018) 492–512.

Abstract Views: 416

PDF Views: 117