Cargando…

Efficient Approach for Anomaly Detection in IoT Using System Calls

The Internet of Things (IoT) has shown rapid growth and wide adoption in recent years. However, IoT devices are not designed to address modern security challenges. The weak security of these devices has been exploited by malicious actors and has led to several serious cyber-attacks. In this context,...

Descripción completa

Detalles Bibliográficos
Autores principales: Shamim, Nouman, Asim, Muhammad, Baker, Thar, Awad, Ali Ismail
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9861298/
https://www.ncbi.nlm.nih.gov/pubmed/36679447
http://dx.doi.org/10.3390/s23020652
_version_ 1784874806309552128
author Shamim, Nouman
Asim, Muhammad
Baker, Thar
Awad, Ali Ismail
author_facet Shamim, Nouman
Asim, Muhammad
Baker, Thar
Awad, Ali Ismail
author_sort Shamim, Nouman
collection PubMed
description The Internet of Things (IoT) has shown rapid growth and wide adoption in recent years. However, IoT devices are not designed to address modern security challenges. The weak security of these devices has been exploited by malicious actors and has led to several serious cyber-attacks. In this context, anomaly detection approaches are considered very effective owing to their ability to detect existing and novel attacks while requiring data only from normal execution. Because of the limited resources of IoT devices, conventional security solutions are not feasible. This emphasizes the need to develop new approaches that are specifically tailored to IoT devices. In this study, we propose a host-based anomaly detection approach that uses system call data and a Markov chain to represent normal behavior. This approach addresses the challenges that existing approaches face in this area, mainly the segmentation of the syscall trace into suitable smaller units and the use of a fixed threshold to differentiate between normal and malicious syscall sequences. Our proposed approach provides a mechanism for segmenting syscall traces into the program’s execution paths and dynamically determines the threshold for anomaly detection. The proposed approach was evaluated against various attacks using two well-known public datasets provided by the University of New South Mexico (UNM) and one custom dataset (PiData) developed in the laboratory. We also compared the performance and characteristics of our proposed approach with those of recently published related work. The proposed approach has a very low false positive rate (0.86%), high [Formula: see text] (100%), and a high [Formula: see text] score (100%) that is, a combined performance measure of [Formula: see text] and [Formula: see text].
format Online
Article
Text
id pubmed-9861298
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-98612982023-01-22 Efficient Approach for Anomaly Detection in IoT Using System Calls Shamim, Nouman Asim, Muhammad Baker, Thar Awad, Ali Ismail Sensors (Basel) Article The Internet of Things (IoT) has shown rapid growth and wide adoption in recent years. However, IoT devices are not designed to address modern security challenges. The weak security of these devices has been exploited by malicious actors and has led to several serious cyber-attacks. In this context, anomaly detection approaches are considered very effective owing to their ability to detect existing and novel attacks while requiring data only from normal execution. Because of the limited resources of IoT devices, conventional security solutions are not feasible. This emphasizes the need to develop new approaches that are specifically tailored to IoT devices. In this study, we propose a host-based anomaly detection approach that uses system call data and a Markov chain to represent normal behavior. This approach addresses the challenges that existing approaches face in this area, mainly the segmentation of the syscall trace into suitable smaller units and the use of a fixed threshold to differentiate between normal and malicious syscall sequences. Our proposed approach provides a mechanism for segmenting syscall traces into the program’s execution paths and dynamically determines the threshold for anomaly detection. The proposed approach was evaluated against various attacks using two well-known public datasets provided by the University of New South Mexico (UNM) and one custom dataset (PiData) developed in the laboratory. We also compared the performance and characteristics of our proposed approach with those of recently published related work. The proposed approach has a very low false positive rate (0.86%), high [Formula: see text] (100%), and a high [Formula: see text] score (100%) that is, a combined performance measure of [Formula: see text] and [Formula: see text]. MDPI 2023-01-06 /pmc/articles/PMC9861298/ /pubmed/36679447 http://dx.doi.org/10.3390/s23020652 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shamim, Nouman
Asim, Muhammad
Baker, Thar
Awad, Ali Ismail
Efficient Approach for Anomaly Detection in IoT Using System Calls
title Efficient Approach for Anomaly Detection in IoT Using System Calls
title_full Efficient Approach for Anomaly Detection in IoT Using System Calls
title_fullStr Efficient Approach for Anomaly Detection in IoT Using System Calls
title_full_unstemmed Efficient Approach for Anomaly Detection in IoT Using System Calls
title_short Efficient Approach for Anomaly Detection in IoT Using System Calls
title_sort efficient approach for anomaly detection in iot using system calls
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9861298/
https://www.ncbi.nlm.nih.gov/pubmed/36679447
http://dx.doi.org/10.3390/s23020652
work_keys_str_mv AT shamimnouman efficientapproachforanomalydetectioniniotusingsystemcalls
AT asimmuhammad efficientapproachforanomalydetectioniniotusingsystemcalls
AT bakerthar efficientapproachforanomalydetectioniniotusingsystemcalls
AT awadaliismail efficientapproachforanomalydetectioniniotusingsystemcalls