Status | 已发表Published |
Title | AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI Assisted IoT |
Creator | |
Date Issued | 2021 |
Source Publication | IEEE Internet of Things Journal
![]() |
ISSN | 2327-4662 |
Volume | 9Issue:22Pages:22184-22193 |
Abstract | Internet of Things (IoT) is one of the rapidly developing technologies today that attract huge real-world applications. However, the reality is that IoT is easily vulnerable to numerous types of cyberattacks and anomalies. Detecting them is becoming increasingly challenging day by day due to limitations with IoT devices and threat intelligence. Particularly, one of the most challenging problems is to detect the existence of malicious adversaries that continuously adapt or conceal their behaviors in IoT to hide their actions and to make the IoT security protocol ineffective. In this paper, we study this problem at the IoT device level that can be a great idea to avoid potential attacks. We present AntiConcealer, an edge-aided IoT framework, and propose an edge artificial intelligence-enabled approach (EdgeAI) for detecting adversary concealed behaviors in the IoT. We first develop an adversary behavior model and use this to identify mid-attack temporal patterns through learning the Multivariate Hawkes Process (MHP), a kind of point process as a random and finite series of events (e.g., behaviors) controlled by a probabilistic model. Naturally, learning MHP processed on EdgeAI reveals the influence of the concealed behaviors of adversaries in the IoT. These concealed behaviors are then grouped using a non-negative weighted influence matrix. To observe the performance of the AntiConcealer framework through evaluation, we employ honeypots integrated with edge servers and verify the usability and reliability of adversary behavioral identification. |
Keyword | adversary behaviors AI/ML behavior detection Botnet EdgeAI Image edge detection Internet of Things Internet of Things (IoT) Malware Multivariate Hawkes Process (MHP). Probabilistic logic Security Servers |
DOI | 10.1109/JIOT.2021.3103138 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science ; Engineering ; Telecommunications |
WOS Subject | Computer Science, Information Systems ; Engineering, Electrical & Electronic ; Telecommunications |
WOS ID | WOS:000879049400018 |
Scopus ID | 2-s2.0-85112148579 |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/7097 |
Collection | Research outside affiliated institution |
Affiliation | 1.School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing 100876, China. 2.Department of Computer and Information Sciences, Fordham University, NY, USA 10458 3.College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China 4.Artificial Intelligence and Future Networks, Beijing Normal University & UIC, Guangdong. and College of Computer Science and Technology, Huaqiao University, China, Fujian 361021, China 5.Institute of Big Data and Internet Innovation, Hunan University of Technology and Business, Changsha 410205, China 6.Department of Computer and Information Sciences, Fordham University, NY, USA 10458 |
Recommended Citation GB/T 7714 | Zhang, Jiwei,Bhuiyan, Md Zakirul Alam,Yang, Xuet al. AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI Assisted IoT[J]. IEEE Internet of Things Journal, 2021, 9(22): 22184-22193. |
APA | Zhang, Jiwei., Bhuiyan, Md Zakirul Alam., Yang, Xu., Wang, Tian., Xu, Xuesong., .. & Khan, Faiza. (2021). AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI Assisted IoT. IEEE Internet of Things Journal, 9(22), 22184-22193. |
MLA | Zhang, Jiwei,et al."AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI Assisted IoT". IEEE Internet of Things Journal 9.22(2021): 22184-22193. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment