Abstract
In this paper, we introduce an approach to secure IoT devices from unsolicited emails by using certain AI-based features and clustering in real-time. We propose a novel approach that first filters the unwanted emails from the incoming traffic and then classifies them into spam and phishing for Internet of Things (IoTs) based systems in industry 4.0. The AI mechanism collects and analyzes emails to detect multiple features that identify patterns for classification. We divided our incoming data into batches and each batch was classified based on knowledge gained from previous batch's classification. We tested our results with a number of classifiers and results show that our approach gives highly accurate classification.
Similar content being viewed by others
References
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–2376.
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.
SANS Institute. SANS newsletter: Volume XVII—Issue #37 (Internet). https://www.sans.org/newsletters/newsbites/xvii/37. Accessed 2021 January 11.
Cvitić, I., Peraković, D., Periša, M., & Husnjak, S. (2019). An overview of distributed denial of service traffic detection approaches. PROMET—Traffic and Transportation, 31(4), 453–464.
Cvitić, I., Peraković, D., Periša, M., & Gupta, B. B. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics Ensemble, 2021, 1–24. https://doi.org/10.1007/s13042-020-01241-0.
Jurcut, A., Niculcea, T., Ranaweera, P., & Le-Khac, N.-A. (2020). Security considerations for Internet of Things: A survey. SN Computer Science, 1(4), 193. https://doi.org/10.1007/s42979-020-00201-3.
Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems, 108, 909–920.
Proofpint. Proofpoint Uncovers Internet of Things (IoT) Cyberattack (Internet) (2015). http://investors.proofpoint.com/releasedetail.cfm?releaseid=819799. Accessed 2020 September 23.
Cvitić, I., Vujić, M., & Husnjak, S. (2016). Classification of security risks in the IoT environment. In 26-th daaam international symposium on intelligent manufacturing and automation (pp. 731–740).
Cvitic, I., Peraković, D., Periša, M., & Jurcut, A. D. (2021). Methodology for detecting cyber intrusions in e-learning systems during COVID-19. In Mobile networks and applications (in press).
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2019). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks. https://doi.org/10.1007/s11276-019-02043-1.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of Things. Computer, 44(9), 51–58.
Hanson, J. (2020). The 10 challenges of securing IoT communications (Internet). Available from https://www.pubnub.com/blog/2015-05-04-10-challenges-securing-iot-communications-iot-security/. Accessed September 18, 2020.
Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE Communications Surveys and Tutorials, 15(4), 2070–2090.
Jain, K., & Agrawal, S. (2014). A hybrid approach for spam filtering using local concentration based K-means clustering. In Proceedings of the 5th international conference on confluence 2014: The next generation information technology summit (pp. 194–199).
Georgala, K., Kosmopoulos, A., & Paliouras, G. (2014). Spam filtering: An active learning approach using incremental clustering. In ACM international conference proceeding series.
Debarr, D., Ramanathan, V., & Wechsler, H. (2013). Phishing detection using traffic behavior, spectral clustering, and random forests. In IEEE ISI 2013–2013 IEEE international conference on intelligence and security informatics: Big data, emergent threats, and decision-making in security informatics (pp. 67–72).
Hamid, I. R. A., & Abawajy, J. H. (2013). Profiling phishing email based on clustering approach. In Proceedings—12th IEEE international conference on trust, security and privacy in computing and communications, TrustCom 2013 (pp. 628–635).
Fette, I., Sadeh, N., & Tomasic, A. (2007). Learning to detect phishing emails. In 16th international world wide web conference, WWW2007 (pp. 649–656).
Zainab, A., Refaat, S. S., & Bouhali, O. (2020). Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques. Information (Switzerland), 11(11), 344.
Makkar, A., Garg, S., Kumar, N., Hossain, M. S., Ghoneim, A., & Alrashoud, M. (2021). An efficient spam detection technique for IoT devices using machine learning. IEEE Transactions on Industrial Informatics, 17(2), 903–912.
Toolan, F., & Carthy, J. (2010). Feature selection for Spam and Phishing detection. In General members meeting and ecrime researchers summit, eCrime 2010.
Esposito, C., Ficco, M., & Gupta, B. B. (2021). Blockchain-based authentication and authorization for smart city applications. Information Processing and Management, 58(2), 102468.
Alsmirat, M. A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications, 78(3), 3649–3688.
Yu, C., Li, J., Li, X., Ren, X., & Gupta, B. B. (2018). Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications, 77(4), 4585–4608.
Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication Systems, 2021, 1–16.
Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3033131.
Apache. (2020). Spam assasins project (Internet). https://spamassassin.apache.org/. Accessed 2021 January 19.
Nazario, J. (2005). Phishing corpus (Internet). Available from https://monkey.org/~jose/phishing/. Accessed 2019 May 16.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gupta, B.B., Tewari, A., Cvitić, I. et al. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0. Wireless Netw 28, 493–503 (2022). https://doi.org/10.1007/s11276-021-02619-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-021-02619-w