Abstract
The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.
Similar content being viewed by others
Data availability
Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.
References
Sharma R, Villányi B (2022) Consistent round hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0. Internet Things Cyber-Phys Syst 2:170–179
Szymanski TH (2022) The “cyber security via determinism” paradigm for a quantum safe zero trust deterministic internet of things (IoT). IEEE Access 10:45893–45930
Sun S, Liu C, Zhu Y, He H, Xiao S, Wen J (2022) Deep reinforcement learning for the detection of abnormal data in smart meters. Sensors 22(21):8543
García-Teodoro P, Camacho J, Maciá-Fernández G, Gómez-Hernández JA, López-Marín VJ (2022) A novel zero-trust network access control scheme based on the security profile of devices and users. Comput Netw 212:109068
Muhammad MA, Ayesh A (2019) A behaviour profiling based technique for network access control systems. Int J Cyber-Secur Digit Forens (IJCSDF) 8:23–30
Ramezanpour K, Jagannath J (2022) Intelligent zero trust architecture for 5G/6G networks: principles, challenges, and the role of machine learning in the context of O-RAN. Comput Netw 217:109358
Sarkar S, Choudhary G, Shandilya SK, Hussain A, Kim H (2022) Security of zero trust networks in cloud computing: a comparative review. Sustainability 14(18):11213
Tien CW, Huang TY, Chen PC, Wang JH (2020) Automatic device identification and anomaly detection with machine learning techniques in smart factories. In: 2020 IEEE international conference on big data (big data). IEEE, pp 3539–3544
Ma Q, Sun C, Cui B (2021) A novel model for anomaly detection in network traffic based on support vector machine and clustering. Secur Commun Netw 2021:1–11
Li S, Iqbal M, Saxena N (2022) Future industry internet of things with zero-trust security. Inf Syst Front. https://doi.org/10.1007/s10796-021-10199-5
Pang G, van den Hengel A, Shen C, Cao L (2020) Deep reinforcement learning for unknown anomaly detection. arXiv:2009.06847
Arshad K, Ali RF, Muneer A, Aziz IA, Naseer S, Khan NS, Taib SM (2022) Deep reinforcement learning for anomaly detection: a systematic review. IEEE Access 10:124017–124035. https://doi.org/10.1109/ACCESS.2022.3224023
Dadkhah S, Mahdikhani H, Danso PK, Zohourian A, Truong KA, Ghorbani AA (2022) Towards the development of a realistic multidimensional IoT profiling dataset. In: 2022 19th annual international conference on privacy, security & trust (PST). IEEE, pp 1–11
Han S, Wu Q, Yang Y (2022) Machine learning for Internet of things anomaly detection under low-quality data. Int J Distrib Sens Netw 18(10):15501329221133764
Muhammad M, Daniel Ani U, Abdullahi AA, Radanliev P (2021) Device-type profiling for network access control systems using clustering-based multivariate gaussian outlier score. In: The 5th international conference on future networks & distributed systems, pp 270–279
Chatterjee A, Ahmed BS (2022) IoT anomaly detection methods and applications: a survey. Internet Things 19:100568
Xie Y, Zhang K, Kou H, Mokarram MJ (2022) Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing. J Cloud Comput 11(1):1–12
Vinay Singh S-SC (2022) How are reinforcement learning and deep learning algorithms used for big data based decision making in financial industries–a review and research agenda. Int J Inf Manag Data Insights. https://doi.org/10.1016/j.jjimei.2022.100094
Treloar NJ, Braniff N, Ingalls B, Barnes CP (2022) Deep reinforcement learning for optimal experimental design in biology. PLoS Comput Biol 18(11):e1010695
Hireche O, Benzaïd C, Taleb T (2022) Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput Netw 203:108668
Guembe B, Azeta A, Osamor V (2022) Explainable artificial intelligence, the fourth pillar of zero trust security. Available at SSRN 4331547
Kwon H, Lee S, Jeong D (2021) User profiling via application usage pattern on digital devices for digital forensics. Expert Syst Appl 168:114488
Al Jallad K, Aljnidi M, Desouki MS (2020) Anomaly detection optimization using big data and deep learning to reduce false-positive. J Big Data 7(1):1–12
De S, Bermudez-Edo M, Xu H, Cai Z (2022) Deep generative models in the industrial internet of things: a survey. IEEE Trans Industr Inf 18(9):5728–5737
Rey V, Sánchez PMS, Celdrán AH, Bovet G (2022) Federated learning for malware detection in IoT devices. Comput Netw 204:108693
Arabi AA, Nyamasvisva TE, Valloo S (2022) Zero trust security implementation considerations in decentralised network resources for institutions of higher learning. Int J Infrastructure Res Manag 10(1):79–90. https://iukl.edu.my/rmc/publications/ijirm/
He Y, Huang D, Chen L, Ni Y, Ma X (2022) A survey on zero trust architecture: challenges and future trends. Wirel Commun Mob Com 2022:6476274. https://doi.org/10.1155/2022/6476274
Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409
Lakshmanna K, Kaluri R, Gundluru N, Alzamil ZS, Rajput DS, Khan AA, Alhussen A (2022) A review on deep learning techniques for IoT data. Electronics 11(10):1604
Fang L, Wu C, Kang Y, Ou W, Zhou D, Ye J (2022) Zero-trust-based protection scheme for users in internet of vehicles. Secur Commun Netw 2022:9896689. https://doi.org/10.1155/2022/9896689
Goh Y, Yun J, Jung D, Chung JM (2022) Secure trust-based delegated consensus for blockchain frameworks using deep reinforcement learning. IEEE Access 10:118498–118511
Han T, Muhammad K, Hussain T, Lloret J, Baik SW (2020) An efficient deep learning framework for intelligent energy management in IoT networks. IEEE Internet Things J 8(5):3170–3179
Alabadi M, Habbal A, Wei X (2022) Industrial internet of things: requirements, architecture, challenges, and future research directions. IEEE Access 10:66374–66400. https://doi.org/10.1109/ACCESS.2022.3185049
Rathee G, Kerrache CA, Ferrag MA (2022) A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems. J Sens Actuator Netw 11(4):71
Wei P, Guo K, Li Y, Wang J, Feng W, Jin S, Liang YC (2022) Reinforcement learning-empowered mobile edge computing for 6G edge intelligence. IEEE Access 10:65156–65192
Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial Internet of Things security: requirements and fog computing opportunities. IEEE Commun Surv Tutor 22(4):2489–2520
Qinxia H, Nazir S, Li M, Ullah H, Lianlian W, Ahmad S (2021) AI-enabled sensing and decision-making for IoT systems. Complexity 2021:1–9
Parameswarappa P (2022) Artificial intelligence based zero trust network. Netw Secur 10:12
Jagatheesaperumal SK, Pham QV, Ruby R, Yang Z, Xu C, Zhang Z (2022) Explainable AI over the Internet of Things (IoT): overview, state-of-the-art and future directions. IEEE Open J Commun Soc 3:2106–2136. https://doi.org/10.1109/OJCOMS.2022.3215676
Zhang Z, Al Hamadi H, Damiani E, Yeun CY, Taher F (2022) Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access 10:93104–93139. https://doi.org/10.1109/ACCESS.2022.3204051
Divya P, Sherin Sithara A (2022) A zero trust framework security to prevent data breaches and mitigate the cloud network attacks. Ijraset J Res Appl Sci Eng Technol. https://doi.org/10.22214/ijraset.2022.42976
Peres RS, Jia X, Lee J, Sun K, Colombo AW, Barata J (2020) Industrial artificial intelligence in industry 4.0-systematic review, challenges and outlook. IEEE Access 8:220121–220139
Sharma R, Villányi B (2022) Evaluation of corporate requirements for smart manufacturing systems using predictive analytics. Internet Things 19:100554
Das R, Inuwa MM (2023) A review on fog computing: issues, characteristics, challenges, and potential applications. Telemat Inform Rep 10:100049. https://doi.org/10.1016/j.teler.2023.100049
Singh H (2021) Big data, industry 4.0 and cyber-physical systems integration: a smart industry context. Mater Today Proc 46:157–162
Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381
Sharma N, Sharma R, Jindal N (2021) Machine learning and deep learning applications-a vision. Global Transit Proc 2(1):24–28
Buck C, Olenberger C, Schweizer A, Völter F, Eymann T (2021) Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput Secur 110:102436
Wang B, Hua Q, Zhang H, Tan X, Nan Y, Chen R, Shu X (2022) Research on anomaly detection and real-time reliability evaluation with the log of cloud platform. Alex Eng J 61(9):7183–7193
Pang G, Shen C, Cao L, Hengel AVD (2021) Deep learning for anomaly detection: a review. ACM Comput Surv (CSUR) 54(2):1–38
AlDahoul N, Abdul Karim H, Ba Wazir AS (2021) Model fusion of deep neural networks for anomaly detection. J Big Data 8:1–18
Hu X, Xie C, Fan Z, Duan Q, Zhang D, Jiang L, Chanussot J (2022) Hyperspectral anomaly detection using deep learning: a review. Remote Sens 14(9):1973
Elbaghazaoui BE, Amnai M, Fakhri Y (2022) Data profiling and machine learning to identify influencers from social media platforms. J ICT Stand 10(2):201–218. https://doi.org/10.13052/jicts2245-800X.1026
Safi M, Kaur B, Dadkhah S, Shoeleh F, Lashkari AH, Molyneaux H, Ghorbani AA (2021) Behavioural monitoring and security profiling in the internet of things (IoT). In: 2021 IEEE 23rd Int Conf on high performance computing & communications; 7th Int Conf on data science & systems; 19th Int Conf on smart city; 7th Int Conf on dependability in sensor, cloud & big data systems & application (HPCC/DSS/SmartCity/DependSys). IEEE, pp 1203–1210
Couronné R, Probst P, Boulesteix AL (2018) Random forest versus logistic regression: a large-scale benchmark experiment. BMC Bioinform 19:1–14
Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things. IEEE Internet Things J 9(5):3962–3977
CIC IoT Dataset 2022. https://www.unb.ca/cic/datasets/iotdataset-2022.html
dpkt tool. https://dpkt.readthedocs.io/en/latest/
Funding
The authors received no specific funding for this study.
Author information
Authors and Affiliations
Contributions
All authors have equally contributed to the design and development of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Consent to participate
All authors have mutually consented to participate.
Consent to publish
All the authors have consented the Journal to publish this paper.
Ethics approval
No Human subject or animals are involved in the research.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dhanaraj, R.K., Singh, A. & Nayyar, A. Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. Computing (2024). https://doi.org/10.1007/s00607-024-01269-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00607-024-01269-y
Keywords
- Matyas–Meyer–Oseas compression
- Deep reinforcement learning
- Substitution-permutation
- Anomaly detection
- Device profiling