Skip to main content
Log in

Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.

References

  1. Sharma R, Villányi B (2022) Consistent round hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0. Internet Things Cyber-Phys Syst 2:170–179

    Article  Google Scholar 

  2. Szymanski TH (2022) The “cyber security via determinism” paradigm for a quantum safe zero trust deterministic internet of things (IoT). IEEE Access 10:45893–45930

    Article  Google Scholar 

  3. Sun S, Liu C, Zhu Y, He H, Xiao S, Wen J (2022) Deep reinforcement learning for the detection of abnormal data in smart meters. Sensors 22(21):8543

    Article  Google Scholar 

  4. García-Teodoro P, Camacho J, Maciá-Fernández G, Gómez-Hernández JA, López-Marín VJ (2022) A novel zero-trust network access control scheme based on the security profile of devices and users. Comput Netw 212:109068

    Article  Google Scholar 

  5. Muhammad MA, Ayesh A (2019) A behaviour profiling based technique for network access control systems. Int J Cyber-Secur Digit Forens (IJCSDF) 8:23–30

    Article  Google Scholar 

  6. Ramezanpour K, Jagannath J (2022) Intelligent zero trust architecture for 5G/6G networks: principles, challenges, and the role of machine learning in the context of O-RAN. Comput Netw 217:109358

    Article  Google Scholar 

  7. Sarkar S, Choudhary G, Shandilya SK, Hussain A, Kim H (2022) Security of zero trust networks in cloud computing: a comparative review. Sustainability 14(18):11213

    Article  Google Scholar 

  8. Tien CW, Huang TY, Chen PC, Wang JH (2020) Automatic device identification and anomaly detection with machine learning techniques in smart factories. In: 2020 IEEE international conference on big data (big data). IEEE, pp 3539–3544

  9. Ma Q, Sun C, Cui B (2021) A novel model for anomaly detection in network traffic based on support vector machine and clustering. Secur Commun Netw 2021:1–11

    Google Scholar 

  10. Li S, Iqbal M, Saxena N (2022) Future industry internet of things with zero-trust security. Inf Syst Front. https://doi.org/10.1007/s10796-021-10199-5

    Article  Google Scholar 

  11. Pang G, van den Hengel A, Shen C, Cao L (2020) Deep reinforcement learning for unknown anomaly detection. arXiv:2009.06847

  12. Arshad K, Ali RF, Muneer A, Aziz IA, Naseer S, Khan NS, Taib SM (2022) Deep reinforcement learning for anomaly detection: a systematic review. IEEE Access 10:124017–124035. https://doi.org/10.1109/ACCESS.2022.3224023

    Article  Google Scholar 

  13. Dadkhah S, Mahdikhani H, Danso PK, Zohourian A, Truong KA, Ghorbani AA (2022) Towards the development of a realistic multidimensional IoT profiling dataset. In: 2022 19th annual international conference on privacy, security & trust (PST). IEEE, pp 1–11

  14. Han S, Wu Q, Yang Y (2022) Machine learning for Internet of things anomaly detection under low-quality data. Int J Distrib Sens Netw 18(10):15501329221133764

    Article  Google Scholar 

  15. Muhammad M, Daniel Ani U, Abdullahi AA, Radanliev P (2021) Device-type profiling for network access control systems using clustering-based multivariate gaussian outlier score. In: The 5th international conference on future networks & distributed systems, pp 270–279

  16. Chatterjee A, Ahmed BS (2022) IoT anomaly detection methods and applications: a survey. Internet Things 19:100568

    Article  Google Scholar 

  17. Xie Y, Zhang K, Kou H, Mokarram MJ (2022) Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing. J Cloud Comput 11(1):1–12

    Article  Google Scholar 

  18. Vinay Singh S-SC (2022) How are reinforcement learning and deep learning algorithms used for big data based decision making in financial industries–a review and research agenda. Int J Inf Manag Data Insights. https://doi.org/10.1016/j.jjimei.2022.100094

    Article  Google Scholar 

  19. Treloar NJ, Braniff N, Ingalls B, Barnes CP (2022) Deep reinforcement learning for optimal experimental design in biology. PLoS Comput Biol 18(11):e1010695

    Article  Google Scholar 

  20. Hireche O, Benzaïd C, Taleb T (2022) Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput Netw 203:108668

    Article  Google Scholar 

  21. Guembe B, Azeta A, Osamor V (2022) Explainable artificial intelligence, the fourth pillar of zero trust security. Available at SSRN 4331547

  22. Kwon H, Lee S, Jeong D (2021) User profiling via application usage pattern on digital devices for digital forensics. Expert Syst Appl 168:114488

    Article  Google Scholar 

  23. Al Jallad K, Aljnidi M, Desouki MS (2020) Anomaly detection optimization using big data and deep learning to reduce false-positive. J Big Data 7(1):1–12

    Article  Google Scholar 

  24. De S, Bermudez-Edo M, Xu H, Cai Z (2022) Deep generative models in the industrial internet of things: a survey. IEEE Trans Industr Inf 18(9):5728–5737

    Article  Google Scholar 

  25. Rey V, Sánchez PMS, Celdrán AH, Bovet G (2022) Federated learning for malware detection in IoT devices. Comput Netw 204:108693

    Article  Google Scholar 

  26. Arabi AA, Nyamasvisva TE, Valloo S (2022) Zero trust security implementation considerations in decentralised network resources for institutions of higher learning. Int J Infrastructure Res Manag 10(1):79–90. https://iukl.edu.my/rmc/publications/ijirm/

    Google Scholar 

  27. He Y, Huang D, Chen L, Ni Y, Ma X (2022) A survey on zero trust architecture: challenges and future trends. Wirel Commun Mob Com 2022:6476274. https://doi.org/10.1155/2022/6476274

    Article  Google Scholar 

  28. Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409

    Article  Google Scholar 

  29. Lakshmanna K, Kaluri R, Gundluru N, Alzamil ZS, Rajput DS, Khan AA, Alhussen A (2022) A review on deep learning techniques for IoT data. Electronics 11(10):1604

    Article  Google Scholar 

  30. Fang L, Wu C, Kang Y, Ou W, Zhou D, Ye J (2022) Zero-trust-based protection scheme for users in internet of vehicles. Secur Commun Netw 2022:9896689. https://doi.org/10.1155/2022/9896689

    Article  Google Scholar 

  31. Goh Y, Yun J, Jung D, Chung JM (2022) Secure trust-based delegated consensus for blockchain frameworks using deep reinforcement learning. IEEE Access 10:118498–118511

    Article  Google Scholar 

  32. Han T, Muhammad K, Hussain T, Lloret J, Baik SW (2020) An efficient deep learning framework for intelligent energy management in IoT networks. IEEE Internet Things J 8(5):3170–3179

    Article  Google Scholar 

  33. Alabadi M, Habbal A, Wei X (2022) Industrial internet of things: requirements, architecture, challenges, and future research directions. IEEE Access 10:66374–66400. https://doi.org/10.1109/ACCESS.2022.3185049

    Article  Google Scholar 

  34. Rathee G, Kerrache CA, Ferrag MA (2022) A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems. J Sens Actuator Netw 11(4):71

    Article  Google Scholar 

  35. Wei P, Guo K, Li Y, Wang J, Feng W, Jin S, Liang YC (2022) Reinforcement learning-empowered mobile edge computing for 6G edge intelligence. IEEE Access 10:65156–65192

    Article  Google Scholar 

  36. Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial Internet of Things security: requirements and fog computing opportunities. IEEE Commun Surv Tutor 22(4):2489–2520

    Article  Google Scholar 

  37. Qinxia H, Nazir S, Li M, Ullah H, Lianlian W, Ahmad S (2021) AI-enabled sensing and decision-making for IoT systems. Complexity 2021:1–9

    Article  Google Scholar 

  38. Parameswarappa P (2022) Artificial intelligence based zero trust network. Netw Secur 10:12

    Google Scholar 

  39. Jagatheesaperumal SK, Pham QV, Ruby R, Yang Z, Xu C, Zhang Z (2022) Explainable AI over the Internet of Things (IoT): overview, state-of-the-art and future directions. IEEE Open J Commun Soc 3:2106–2136. https://doi.org/10.1109/OJCOMS.2022.3215676

    Article  Google Scholar 

  40. Zhang Z, Al Hamadi H, Damiani E, Yeun CY, Taher F (2022) Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access 10:93104–93139. https://doi.org/10.1109/ACCESS.2022.3204051

    Article  Google Scholar 

  41. Divya P, Sherin Sithara A (2022) A zero trust framework security to prevent data breaches and mitigate the cloud network attacks. Ijraset J Res Appl Sci Eng Technol. https://doi.org/10.22214/ijraset.2022.42976

    Article  Google Scholar 

  42. Peres RS, Jia X, Lee J, Sun K, Colombo AW, Barata J (2020) Industrial artificial intelligence in industry 4.0-systematic review, challenges and outlook. IEEE Access 8:220121–220139

    Article  Google Scholar 

  43. Sharma R, Villányi B (2022) Evaluation of corporate requirements for smart manufacturing systems using predictive analytics. Internet Things 19:100554

    Article  Google Scholar 

  44. Das R, Inuwa MM (2023) A review on fog computing: issues, characteristics, challenges, and potential applications. Telemat Inform Rep 10:100049. https://doi.org/10.1016/j.teler.2023.100049

    Article  Google Scholar 

  45. Singh H (2021) Big data, industry 4.0 and cyber-physical systems integration: a smart industry context. Mater Today Proc 46:157–162

    Article  Google Scholar 

  46. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381

    Article  Google Scholar 

  47. Sharma N, Sharma R, Jindal N (2021) Machine learning and deep learning applications-a vision. Global Transit Proc 2(1):24–28

    Article  Google Scholar 

  48. Buck C, Olenberger C, Schweizer A, Völter F, Eymann T (2021) Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput Secur 110:102436

    Article  Google Scholar 

  49. Wang B, Hua Q, Zhang H, Tan X, Nan Y, Chen R, Shu X (2022) Research on anomaly detection and real-time reliability evaluation with the log of cloud platform. Alex Eng J 61(9):7183–7193

    Article  Google Scholar 

  50. Pang G, Shen C, Cao L, Hengel AVD (2021) Deep learning for anomaly detection: a review. ACM Comput Surv (CSUR) 54(2):1–38

    Article  Google Scholar 

  51. AlDahoul N, Abdul Karim H, Ba Wazir AS (2021) Model fusion of deep neural networks for anomaly detection. J Big Data 8:1–18

    Article  Google Scholar 

  52. Hu X, Xie C, Fan Z, Duan Q, Zhang D, Jiang L, Chanussot J (2022) Hyperspectral anomaly detection using deep learning: a review. Remote Sens 14(9):1973

    Article  Google Scholar 

  53. Elbaghazaoui BE, Amnai M, Fakhri Y (2022) Data profiling and machine learning to identify influencers from social media platforms. J ICT Stand 10(2):201–218. https://doi.org/10.13052/jicts2245-800X.1026

    Google Scholar 

  54. Safi M, Kaur B, Dadkhah S, Shoeleh F, Lashkari AH, Molyneaux H, Ghorbani AA (2021) Behavioural monitoring and security profiling in the internet of things (IoT). In: 2021 IEEE 23rd Int Conf on high performance computing & communications; 7th Int Conf on data science & systems; 19th Int Conf on smart city; 7th Int Conf on dependability in sensor, cloud & big data systems & application (HPCC/DSS/SmartCity/DependSys). IEEE, pp 1203–1210

  55. Couronné R, Probst P, Boulesteix AL (2018) Random forest versus logistic regression: a large-scale benchmark experiment. BMC Bioinform 19:1–14

    Article  Google Scholar 

  56. Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things. IEEE Internet Things J 9(5):3962–3977

    Article  Google Scholar 

  57. CIC IoT Dataset 2022. https://www.unb.ca/cic/datasets/iotdataset-2022.html

  58. dpkt tool. https://dpkt.readthedocs.io/en/latest/

Download references

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equally contributed to the design and development of the manuscript.

Corresponding author

Correspondence to Anand Nayyar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Consent to participate

All authors have mutually consented to participate.

Consent to publish

All the authors have consented the Journal to publish this paper.

Ethics approval

No Human subject or animals are involved in the research.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhanaraj, R.K., Singh, A. & Nayyar, A. Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. Computing (2024). https://doi.org/10.1007/s00607-024-01269-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00607-024-01269-y

Keywords

Mathematics Subject Classification

Navigation