A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks

The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE journal on selected areas in communications 2020-06, Vol.38 (6), p.1218-1228
Hauptverfasser: Guizani, Nadra, Ghafoor, Arif
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1228
container_issue 6
container_start_page 1218
container_title IEEE journal on selected areas in communications
container_volume 38
creator Guizani, Nadra
Ghafoor, Arif
description The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.
doi_str_mv 10.1109/JSAC.2020.2986618
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2406701490</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9066974</ieee_id><sourcerecordid>2406701490</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</originalsourceid><addsrcrecordid>eNo9kE1PwkAQhjdGExH9AcbLJp6Ls9t2P46IohjUA-jBy2bbzpIitLhbQvDXWwQ9TSZ53ncyDyGXDHqMgb55mvQHPQ4celwrIZg6Ih2WpioCAHVMOiDjOFKSiVNyFsIcgCWJ4h3y0acv2Gxq_0mH6ypvyrqi76Vv1nZRftvfdbINDS6pqz29wwZbpprRZ7vYWI-0rOjY-hnSUT2ltzZg8dcXzsmJs4uAF4fZJW_D--ngMRq_PowG_XGUcx03UVGASJQDcDFktpBcJgq0zZkVIlNZXkDGU5dbTKVyKFJMmJUuszbNhc5AxF1yve9d-fprjaEx83rtq_ak4QkI2b6qoaXYnsp9HYJHZ1a-XFq_NQzMTqHZKTQ7heagsM1c7TMlIv7zGoTQMol_AA-mbXM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2406701490</pqid></control><display><type>article</type><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Guizani, Nadra ; Ghafoor, Arif</creator><creatorcontrib>Guizani, Nadra ; Ghafoor, Arif</creatorcontrib><description>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2020.2986618</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Computer architecture ; Countermeasures ; Internet of Things ; IoT devices ; Machine learning ; Malware ; Military technology ; Network function virtualization ; Networks ; Neural networks ; Patching ; Performance evaluation ; Protocol (computers) ; Protocols ; recurrent neural network ; Security ; Security systems ; Software ; software based architecture</subject><ispartof>IEEE journal on selected areas in communications, 2020-06, Vol.38 (6), p.1218-1228</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</citedby><cites>FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</cites><orcidid>0000-0001-5332-2685 ; 0000-0002-3707-8173</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9066974$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9066974$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guizani, Nadra</creatorcontrib><creatorcontrib>Ghafoor, Arif</creatorcontrib><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</description><subject>Computer architecture</subject><subject>Countermeasures</subject><subject>Internet of Things</subject><subject>IoT devices</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Military technology</subject><subject>Network function virtualization</subject><subject>Networks</subject><subject>Neural networks</subject><subject>Patching</subject><subject>Performance evaluation</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>recurrent neural network</subject><subject>Security</subject><subject>Security systems</subject><subject>Software</subject><subject>software based architecture</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1PwkAQhjdGExH9AcbLJp6Ls9t2P46IohjUA-jBy2bbzpIitLhbQvDXWwQ9TSZ53ncyDyGXDHqMgb55mvQHPQ4celwrIZg6Ih2WpioCAHVMOiDjOFKSiVNyFsIcgCWJ4h3y0acv2Gxq_0mH6ypvyrqi76Vv1nZRftvfdbINDS6pqz29wwZbpprRZ7vYWI-0rOjY-hnSUT2ltzZg8dcXzsmJs4uAF4fZJW_D--ngMRq_PowG_XGUcx03UVGASJQDcDFktpBcJgq0zZkVIlNZXkDGU5dbTKVyKFJMmJUuszbNhc5AxF1yve9d-fprjaEx83rtq_ak4QkI2b6qoaXYnsp9HYJHZ1a-XFq_NQzMTqHZKTQ7heagsM1c7TMlIv7zGoTQMol_AA-mbXM</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Guizani, Nadra</creator><creator>Ghafoor, Arif</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0001-5332-2685</orcidid><orcidid>https://orcid.org/0000-0002-3707-8173</orcidid></search><sort><creationdate>20200601</creationdate><title>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</title><author>Guizani, Nadra ; Ghafoor, Arif</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-dd0648f00f30bad7274809ac1a66b8bcd0b25fcae578fe65e41a7fbaa5c69b063</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer architecture</topic><topic>Countermeasures</topic><topic>Internet of Things</topic><topic>IoT devices</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Military technology</topic><topic>Network function virtualization</topic><topic>Networks</topic><topic>Neural networks</topic><topic>Patching</topic><topic>Performance evaluation</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>recurrent neural network</topic><topic>Security</topic><topic>Security systems</topic><topic>Software</topic><topic>software based architecture</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Guizani, Nadra</creatorcontrib><creatorcontrib>Ghafoor, Arif</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guizani, Nadra</au><au>Ghafoor, Arif</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2020-06-01</date><risdate>2020</risdate><volume>38</volume><issue>6</issue><spage>1218</spage><epage>1228</epage><pages>1218-1228</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>The exponential growth in the use of Internet of Things (IoT) devices has introduced numerous challenges, in particular dealing with new security threats. In addition, for connecting heterogeneous devices using different protocols, large networks need resilient software-based security systems that can defend against unprecedented attacks for which the traditional security countermeasures prove to be ineffective. Furthermore, to deal with the ever growing onslaught on data and networks, modern security systems need to utilize novel machine learning mechanisms. This paper proposes a software-based architecture that provides network function virtualization (NFV) capability to combat malware spread for heterogeneous IoT networks. To build a scalable and generalized Intrusion Detection System (IDS), we propose for these networks a RNN-LSTM learning model that can predict malware attacks in a timely manner for the NFV to deploy appropriate countermeasures. In addition, we investigate the scalability of the network and discuss how the generalized IDS can deal with a broad range of malwares that can be detected. The analysis utilizes the susceptible (S), exposed (E), infected (I), and resistant (R) (SEIR) epidemic model to moniter the spread of the malware attack and subsequently provides patching to the system. Our analysis focuses primarily on the feasibility and the performance evaluation of the proposed integrated RNN-LSTM and NFV architecture.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2020.2986618</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-5332-2685</orcidid><orcidid>https://orcid.org/0000-0002-3707-8173</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0733-8716
ispartof IEEE journal on selected areas in communications, 2020-06, Vol.38 (6), p.1218-1228
issn 0733-8716
1558-0008
language eng
recordid cdi_proquest_journals_2406701490
source IEEE Electronic Library (IEL)
subjects Computer architecture
Countermeasures
Internet of Things
IoT devices
Machine learning
Malware
Military technology
Network function virtualization
Networks
Neural networks
Patching
Performance evaluation
Protocol (computers)
Protocols
recurrent neural network
Security
Security systems
Software
software based architecture
title A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T14%3A07%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Network%20Function%20Virtualization%20System%20for%20Detecting%20Malware%20in%20Large%20IoT%20Based%20Networks&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Guizani,%20Nadra&rft.date=2020-06-01&rft.volume=38&rft.issue=6&rft.spage=1218&rft.epage=1228&rft.pages=1218-1228&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2020.2986618&rft_dat=%3Cproquest_RIE%3E2406701490%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2406701490&rft_id=info:pmid/&rft_ieee_id=9066974&rfr_iscdi=true