SEQUENTIAL INTRUSION DETECTION SYSTEM FOR ZERO-TRUST CYBER DEFENSE OF IOT/IIOT NETWORKS

Main Article Content

Valentyn Sobchuk
Roman Pykhnivskyi
Oleg Barabash
Serhii Korotin
Shakhin Omarov

Abstract

Relevance. The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) and their widespread application make them attractive targets for cyber attacks. Traditional cybersecurity methods such as firewalls and antivirus software are not always effective in protecting IoT/IIoT networks due to their heterogeneity and large number of connected devices. The zero-trust principle can be more effective in protecting IoT/IIoT networks. This principle assumes on no inherent trustworthiness of any user, device, or traffic, requiring authorization and verification before accessing any network resource. This article presents a zero-trust-based intrusion detection system (IDS) that uses machine learning to secure IoT/IIoT networks. The aim of this article is to develop a two-component IDS for detecting and classifying cyber-attacks. The study utilizes machine learning techniques, such as Decision Tree, Random Forest, and XGBoost, on the Edge-IIoTset dataset. The following results were obtained. The IDS structure proposed here employs a sequential approach that consists of two AI modules. The first module detects attacks using a simpler model like Decision Tree. The second module uses more complex models like Random Forest or XGBoost to classify attack types. Experimental evaluation on the Edge-IIoTset dataset demonstrates the system's effectiveness, with an overall accuracy of 95% and significantly reduced response time compared to single complex model systems. Conclusion. The proposed design for an Intrusion Detection System (IDS) achieves high accuracy in detecting attacks while maintaining optimal performance and minimizing additional computational costs. This is especially crucial for real-time network monitoring in IoT/IIoT environments. Further research can focus on the practical implementation of the proposed IDS structure for physical realization in securing IoT/IIoT networks based on the zero-trust principle.

Article Details

How to Cite
Sobchuk , V. ., Pykhnivskyi , R. ., Barabash , O. ., Korotin , S. ., & Omarov , S. . (2024). SEQUENTIAL INTRUSION DETECTION SYSTEM FOR ZERO-TRUST CYBER DEFENSE OF IOT/IIOT NETWORKS. Advanced Information Systems, 8(3), 92–99. https://doi.org/10.20998/2522-9052.2024.3.11
Section
Methods of information systems protection
Author Biographies

Valentyn Sobchuk , Taras Shevchenko Kyiv National University, Kyiv

Doctor of Technical Sciences, Professor, Professor of the Department of Integral and Differential Equations

Roman Pykhnivskyi , Taras Shevchenko Kyiv National University, Kyiv

Postgraduate Student of the Department of Integral and Differential Equations

Oleg Barabash , National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

Doctor of Technical Sciences, Professor, Professor of the Department of Software Engineering for Power Industry

Serhii Korotin , National Defence University of Ukraine, Kyiv

Candidate of Technical Sciences, Assistant Professor, Deputy Chief of Aviation and Air Defense Institute

Shakhin Omarov , Kharkiv National University of Radio Electronics, Kharkiv

Doctor of Economic Sciences, Associate Professor, Professor of Computer-Integrated Technologies, Automation and Robotics Department

References

Vailshery. L. S. (2023), Number of Internet of Things (IoT) Connected Devices Worldwide From 2019 to 2021, with Forecasts From 2022 to 2030, available at: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/

(2024), Cost of a Data Breach Report 2023”, IBM, available at: https://www.ibm.com/reports/data-breach

Rose, S., Borchert, O., Mitchell, S. and Connelly S. (2019), Zero trust architecture, NIST, Gaithersburg, MD, USA, Tech. Rep. NIST 800-207, available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf

(2022), DoD Zero Trust Strategy, Department of Defense, USA, initial published version. 29 p., available at: https://dodcio.defense.gov/Portals/0/Documents/Library/DoD-ZTStrategy.pdf

Freter, R. (2022), Department of Defense (DoD) Zero Trust Reference Architecture, Version 2.0, In Proceedings of the Defense Information Systems Agency (DISA) and National Security Agency (NSA), USA, July 2022, 104 p., available at: https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf

Spadaccino, P. and Cuomo, F. (2022), “Intrusion Detection Systems for IoT: Opportunities and Challenges offered by Edge Computing”, arXiv 2022, doi: https://doi.org/10.48550/arXiv.2012.01174

Gavrylenko, S., Poltoratskyi, V. and Nechyporenko, A. (2024), “Intrusion detection model based on improved transformer”, Advanced Information Systems, vol.8, no.1, pp. 94 – 99, doi: https://doi.org/10.20998/2522-9052.2024.1.12

Ullah, S., Boulila, W., Koubâa, A. and J. Ahmad, (2023), “MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks,” IEEE Access, vol. 11, pp. 114590–114601, doi: https://doi.org/10.1109/ACCESS.2023.3324657

Shmatko, O., Kolomiitsev, O., Rekova, N., Kuchuk, N. and Matvieiev, O. (2023), “Designing and evaluating DL-model for vulnerability detection in smart contracts”, Advanced Information Systems, vol. 7, no. 4, pp. 41–51. doi: https://doi.org/10.20998/2522-9052.2023.4.05

Park, C., Lee, J., Kim, Y., Park, J.-G., Kim, H. and Hong, D. (2023), “An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks”, IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2330–2345, doi: https://doi.org/10.1109/JIOT.2022.3211346

Said R.B., Sabir, Z. and Askerzade, I. (2023), “CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software-Defined Networking With Hybrid Feature Selection”, IEEE Access, vol. 11, pp. 138732–138747, doi: https://doi.org/10.1109/ACCESS.2023.3340142

Sultana, N., Chilamkurti, N., Peng, W. and Alhad, R. (2019), “Survey on SDN based network intrusion detection system using machine learning approaches”, Peer-to-Peer Networking and Applications, vol. 12, pp. 493–501, doi: https://doi.org/10.1007/s12083-017-0630-0

Zaman, S., Alhazmi, Kh., Aseeri, M.A., Ahmed, M.R., Khan, R.T., Kaiser, M.S. and Mahmud, M. (2021), “Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey,” IEEE Access, vol. 9, pp. 94668–94690, doi: https://doi.org/10.1109/ACCESS.2021.3089681

Buczak, A. L. and Guven, E. (2016), “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, second quarter, doi: https://doi.org/10.1109/COMST.2015.2494502

Moustafa, N., Hu, J. and Slay, J. (2019), “A holistic review of Network Anomaly Detection Systems: A comprehensive survey”, Journal of Network and Computer Applications, vol. 128, pp. 33–55, doi: https://doi.org/10.1016/j.jnca.2018.12.006

Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman J. (2019), “Survey of intrusion detection systems: techniques, datasets and challenges”, Cybersecurity, vol. 2, article number 20, doi: https://doi.org/10.1186/s42400-019-0038-7

Lee, S.-W., Mohammed sidqi, H., Mokhtar, M., Rashidi, S., Rahmani, A.M., Masdari, M. and Hosseinzadeh, M. (2021), “Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review”, J. Netw. Comput. Appl., vol. 187, number 103111, doi: https://doi.org/10.1016/j.jnca.2021.103111

Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z. and Doss, R. (2022), “Zero Trust Architecture (ZTA): A Comprehensive Survey,” IEEE Access, vol. 10, 12 May 2022, pp. 57143–57179, doi:

https://doi.org/10.1109/ACCESS.2022.3174679

Yang, Z., Liu, X., Li, T., Wu, D., Wang, J., Zhao, Y. and Han, H. (2022), “A systematic literature review of methods and datasets for anomaly-based network intrusion detection”, Comput. Secur., vol. 116, 102675, doi: https://doi.org/10.1016/j.cose.2022.102675

Alsoufi, M.A., Razak, S., Siraj, M.M., Nafea, I., Ghaleb, F.A., Saeed, F. and Nasser, M. (2021), “Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review”, Appl. Sci., 2021, vol. 11, 8383, doi: https://doi.org/10.3390/app11188383

Mishra, A. and Yadav, P. (2020), “Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence & Machine Learning Algorithms: A Review”, 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, pp. 1–7, doi: https://doi.org/10.1109/IDEA49133.2020.9170674

Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L. and Janicke, H. (2022), “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning,” in IEEE Access, vol. 10, pp. 40281-40306. doi: https://doi.org/10.1109/ACCESS.2022.3165809

Nuaimi, T.A., Zaabi, S.A., Alyilieli, M., AlMaskari, M., Alblooshi, S., Alhabsi, F., Yusof, M.F.B. and Badawi, A.A. (2023), “A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset, Intelligent Systems with Applications”, vol. 20, 200298, ISSN 2667-3053, doi: https://doi.org/10.1016/j.iswa.2023.200298

Nkoro, E.C., Njoku, J.N., Nwakanma, C.I., Lee, J.-M. and Kim, D.-S. (2024), “Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach”, Electronics, vol. 13, is. 276, doi: https://doi.org/10.3390/electronics13020276

Latif, Sh., Boulila, W., Koubaa, A., Zou, Z. and Ahmad, J. (2024), “DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm”, Journal of Network and Computer Applications, vol. 221, 103784, ISSN 1084-8045, doi: https://doi.org/10.1016/j.jnca.2023.103784