Skip to main content

Advertisement

Log in

Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this paper, we introduce an approach to secure IoT devices from unsolicited emails by using certain AI-based features and clustering in real-time. We propose a novel approach that first filters the unwanted emails from the incoming traffic and then classifies them into spam and phishing for Internet of Things (IoTs) based systems in industry 4.0. The AI mechanism collects and analyzes emails to detect multiple features that identify patterns for classification. We divided our incoming data into batches and each batch was classified based on knowledge gained from previous batch's classification. We tested our results with a number of classifiers and results show that our approach gives highly accurate classification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  2. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–2376.

    Article  Google Scholar 

  3. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  4. SANS Institute. SANS newsletter: Volume XVII—Issue #37 (Internet). https://www.sans.org/newsletters/newsbites/xvii/37. Accessed 2021 January 11.

  5. Cvitić, I., Peraković, D., Periša, M., & Husnjak, S. (2019). An overview of distributed denial of service traffic detection approaches. PROMET—Traffic and Transportation, 31(4), 453–464.

    Article  Google Scholar 

  6. Cvitić, I., Peraković, D., Periša, M., & Gupta, B. B. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics Ensemble, 2021, 1–24. https://doi.org/10.1007/s13042-020-01241-0.

    Article  Google Scholar 

  7. Jurcut, A., Niculcea, T., Ranaweera, P., & Le-Khac, N.-A. (2020). Security considerations for Internet of Things: A survey. SN Computer Science, 1(4), 193. https://doi.org/10.1007/s42979-020-00201-3.

    Article  Google Scholar 

  8. Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems, 108, 909–920.

    Article  Google Scholar 

  9. Proofpint. Proofpoint Uncovers Internet of Things (IoT) Cyberattack (Internet) (2015). http://investors.proofpoint.com/releasedetail.cfm?releaseid=819799. Accessed 2020 September 23.

  10. Cvitić, I., Vujić, M., & Husnjak, S. (2016). Classification of security risks in the IoT environment. In 26-th daaam international symposium on intelligent manufacturing and automation (pp. 731–740).

  11. Cvitic, I., Peraković, D., Periša, M., & Jurcut, A. D. (2021). Methodology for detecting cyber intrusions in e-learning systems during COVID-19. In Mobile networks and applications (in press).

  12. Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.

    Article  Google Scholar 

  13. Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2019). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks. https://doi.org/10.1007/s11276-019-02043-1.

    Article  Google Scholar 

  14. Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of Things. Computer, 44(9), 51–58.

    Article  Google Scholar 

  15. Hanson, J. (2020). The 10 challenges of securing IoT communications (Internet). Available from https://www.pubnub.com/blog/2015-05-04-10-challenges-securing-iot-communications-iot-security/. Accessed September 18, 2020.

  16. Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE Communications Surveys and Tutorials, 15(4), 2070–2090.

    Article  Google Scholar 

  17. Jain, K., & Agrawal, S. (2014). A hybrid approach for spam filtering using local concentration based K-means clustering. In Proceedings of the 5th international conference on confluence 2014: The next generation information technology summit (pp. 194–199).

  18. Georgala, K., Kosmopoulos, A., & Paliouras, G. (2014). Spam filtering: An active learning approach using incremental clustering. In ACM international conference proceeding series.

  19. Debarr, D., Ramanathan, V., & Wechsler, H. (2013). Phishing detection using traffic behavior, spectral clustering, and random forests. In IEEE ISI 2013–2013 IEEE international conference on intelligence and security informatics: Big data, emergent threats, and decision-making in security informatics (pp. 67–72).

  20. Hamid, I. R. A., & Abawajy, J. H. (2013). Profiling phishing email based on clustering approach. In Proceedings—12th IEEE international conference on trust, security and privacy in computing and communications, TrustCom 2013 (pp. 628–635).

  21. Fette, I., Sadeh, N., & Tomasic, A. (2007). Learning to detect phishing emails. In 16th international world wide web conference, WWW2007 (pp. 649–656).

  22. Zainab, A., Refaat, S. S., & Bouhali, O. (2020). Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques. Information (Switzerland), 11(11), 344.

  23. Makkar, A., Garg, S., Kumar, N., Hossain, M. S., Ghoneim, A., & Alrashoud, M. (2021). An efficient spam detection technique for IoT devices using machine learning. IEEE Transactions on Industrial Informatics, 17(2), 903–912.

    Article  Google Scholar 

  24. Toolan, F., & Carthy, J. (2010). Feature selection for Spam and Phishing detection. In General members meeting and ecrime researchers summit, eCrime 2010.

  25. Esposito, C., Ficco, M., & Gupta, B. B. (2021). Blockchain-based authentication and authorization for smart city applications. Information Processing and Management, 58(2), 102468.

    Article  Google Scholar 

  26. Alsmirat, M. A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2019). Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools and Applications, 78(3), 3649–3688.

    Article  Google Scholar 

  27. Yu, C., Li, J., Li, X., Ren, X., & Gupta, B. B. (2018). Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications, 77(4), 4585–4608.

    Article  Google Scholar 

  28. Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication Systems, 2021, 1–16.

    Google Scholar 

  29. Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3033131.

    Article  Google Scholar 

  30. Apache. (2020). Spam assasins project (Internet). https://spamassassin.apache.org/. Accessed 2021 January 19.

  31. Nazario, J. (2005). Phishing corpus (Internet). Available from https://monkey.org/~jose/phishing/. Accessed 2019 May 16.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan Cvitić.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, B.B., Tewari, A., Cvitić, I. et al. Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0. Wireless Netw 28, 493–503 (2022). https://doi.org/10.1007/s11276-021-02619-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02619-w

Keywords

Navigation