A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks
The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that c...
Gespeichert in:
Veröffentlicht in: | IEEE journal on selected areas in communications 2020-06, Vol.38 (6), p.1218-1228 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1228 |
---|---|
container_issue | 6 |
container_start_page | 1218 |
container_title | IEEE journal on selected areas in communications |
container_volume | 38 |
creator | Guizani, Nadra Ghafoor, Arif |
description | The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture. |
doi_str_mv | 10.1109/JSAC.2020.2986618 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2406701490</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9066974</ieee_id><sourcerecordid>2406701490</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</originalsourceid><addsrcrecordid>eNo9kE1PwkAQhjdGExH9AcbLJp6Ls9t2P46IohjUA-jBy2bbzpIitLhbQvDXWwQ9TSZ53ncyDyGXDHqMgb55mvQHPQ4celwrIZg6Ih2WpioCAHVMOiDjOFKSiVNyFsIcgCWJ4h3y0acv2Gxq_0mH6ypvyrqi76Vv1nZRftvfdbINDS6pqz29wwZbpprRZ7vYWI-0rOjY-hnSUT2ltzZg8dcXzsmJs4uAF4fZJW_D--ngMRq_PowG_XGUcx03UVGASJQDcDFktpBcJgq0zZkVIlNZXkDGU5dbTKVyKFJMmJUuszbNhc5AxF1yve9d-fprjaEx83rtq_ak4QkI2b6qoaXYnsp9HYJHZ1a-XFq_NQzMTqHZKTQ7heagsM1c7TMlIv7zGoTQMol_AA-mbXM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2406701490</pqid></control><display><type>article</type><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Guizani, Nadra ; Ghafoor, Arif</creator><creatorcontrib>Guizani, Nadra ; Ghafoor, Arif</creatorcontrib><description>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2020.2986618</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Computer architecture ; Countermeasures ; Internet of Things ; IoT devices ; Machine learning ; Malware ; Military technology ; Network function virtualization ; Networks ; Neural networks ; Patching ; Performance evaluation ; Protocol (computers) ; Protocols ; recurrent neural network ; Security ; Security systems ; Software ; software based architecture</subject><ispartof>IEEE journal on selected areas in communications, 2020-06, Vol.38 (6), p.1218-1228</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</citedby><cites>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</cites><orcidid>0000-0001-5332-2685 ; 0000-0002-3707-8173</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9066974$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9066974$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guizani, Nadra</creatorcontrib><creatorcontrib>Ghafoor, Arif</creatorcontrib><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</description><subject>Computer architecture</subject><subject>Countermeasures</subject><subject>Internet of Things</subject><subject>IoT devices</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Military technology</subject><subject>Network function virtualization</subject><subject>Networks</subject><subject>Neural networks</subject><subject>Patching</subject><subject>Performance evaluation</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>recurrent neural network</subject><subject>Security</subject><subject>Security systems</subject><subject>Software</subject><subject>software based architecture</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1PwkAQhjdGExH9AcbLJp6Ls9t2P46IohjUA-jBy2bbzpIitLhbQvDXWwQ9TSZ53ncyDyGXDHqMgb55mvQHPQ4celwrIZg6Ih2WpioCAHVMOiDjOFKSiVNyFsIcgCWJ4h3y0acv2Gxq_0mH6ypvyrqi76Vv1nZRftvfdbINDS6pqz29wwZbpprRZ7vYWI-0rOjY-hnSUT2ltzZg8dcXzsmJs4uAF4fZJW_D--ngMRq_PowG_XGUcx03UVGASJQDcDFktpBcJgq0zZkVIlNZXkDGU5dbTKVyKFJMmJUuszbNhc5AxF1yve9d-fprjaEx83rtq_ak4QkI2b6qoaXYnsp9HYJHZ1a-XFq_NQzMTqHZKTQ7heagsM1c7TMlIv7zGoTQMol_AA-mbXM</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Guizani, Nadra</creator><creator>Ghafoor, Arif</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-5332-2685</orcidid><orcidid>https://orcid.org/0000-0002-3707-8173</orcidid></search><sort><creationdate>20200601</creationdate><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><author>Guizani, Nadra ; Ghafoor, Arif</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer architecture</topic><topic>Countermeasures</topic><topic>Internet of Things</topic><topic>IoT devices</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Military technology</topic><topic>Network function virtualization</topic><topic>Networks</topic><topic>Neural networks</topic><topic>Patching</topic><topic>Performance evaluation</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>recurrent neural network</topic><topic>Security</topic><topic>Security systems</topic><topic>Software</topic><topic>software based architecture</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Guizani, Nadra</creatorcontrib><creatorcontrib>Ghafoor, Arif</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guizani, Nadra</au><au>Ghafoor, Arif</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2020-06-01</date><risdate>2020</risdate><volume>38</volume><issue>6</issue><spage>1218</spage><epage>1228</epage><pages>1218-1228</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2020.2986618</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-5332-2685</orcidid><orcidid>https://orcid.org/0000-0002-3707-8173</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 2020-06, Vol.38 (6), p.1218-1228 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_proquest_journals_2406701490 |
source | IEEE Electronic Library (IEL) |
subjects | Computer architecture Countermeasures Internet of Things IoT devices Machine learning Malware Military technology Network function virtualization Networks Neural networks Patching Performance evaluation Protocol (computers) Protocols recurrent neural network Security Security systems Software software based architecture |
title | A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T14%3A07%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Network%20Function%20Virtualization%20System%20for%20Detecting%20Malware%20in%20Large%20IoT%20Based%20Networks&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Guizani,%20Nadra&rft.date=2020-06-01&rft.volume=38&rft.issue=6&rft.spage=1218&rft.epage=1228&rft.pages=1218-1228&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2020.2986618&rft_dat=%3Cproquest_RIE%3E2406701490%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2406701490&rft_id=info:pmid/&rft_ieee_id=9066974&rfr_iscdi=true |