Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks

Abstract Smart Cities contains millions of IoT sensors supporting critical applications such as Smart Transport, Buildings, Intelligent Vehicles, and Logistics. A central administrator appointed by the government manages and maintains the security of each node. Smart City relies upon millions of sensors that are heterogeneous and do not support standard security architecture. Different manufacturers have weak protection protocols for their products and do not update their firmware upon newly identified operating systems’ vulnerabilities. Adversaries using brute force methods exploit the lack of inbuilt security systems on IoT devices to grow their bot network. Smart cities require a standard framework combining soft computing and Deep Learning (DL) for device fleet management and complete control of sensor operating systems for absolute security. This paper presents a real-world application for IoT fleet management security using a lightweight container-based botnet detection (C-BotDet) framework. Using a three-phase approach, the framework using Artificial Intelligence detects compromised IoT devices sending malicious traffic on the network. Balena Cloud revokes API keys and prevents a compromised device from infecting other devices to form a more giant botnet. VPN (Virtual Private Network) prevents inter-device communication and routes all malicious traffic through an external server. The framework quickly updates the standard Linux-based operating system IoT device fleet without relying on different manufacturers to update their system security individually. The simulation and analysis of the C-BotDet framework are presented in a practical working environment to demonstrate its implementation feasibility.

[1]  Laurence T. Yang,et al.  A deep residual computation model for heterogeneous data learning in smart Internet of Things , 2021, Appl. Soft Comput..

[2]  Samee U. Khan,et al.  Quantifying cloud elasticity with container-based autoscaling , 2019, Future Gener. Comput. Syst..

[3]  Jong Hyuk Park,et al.  DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks , 2019, IEEE Network.

[4]  Gopal K. Shyam,et al.  An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment , 2021, Appl. Soft Comput..

[5]  Uttam Ghosh,et al.  A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT , 2023, IEEE Internet of Things Journal.

[6]  Jong Hyuk Park,et al.  CF-CloudOrch: container fog node-based cloud orchestration for IoT networks , 2018, The Journal of Supercomputing.

[7]  Xin Fan,et al.  Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT , 2019, Future Gener. Comput. Syst..

[8]  Li Zhang,et al.  A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks , 2016, Neural Computing and Applications.

[9]  Deqing Zou,et al.  Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment , 2018, IEEE Transactions on Emerging Topics in Computing.

[10]  Daejin Park,et al.  On-Demand Remote Software Code Execution Unit Using On-Chip Flash Memory Cloudification for IoT Environment Acceleration , 2021, J. Inf. Process. Syst..

[11]  Jong Hyuk Park,et al.  A Comprehensive Analyses of Intrusion Detection System for IoT Environment , 2020, J. Inf. Process. Syst..

[12]  Claudia Szabo,et al.  An adaptive framework for the detection of novel botnets , 2018, Comput. Secur..

[13]  Chu-Sing Yang,et al.  Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices , 2019, Comput. Secur..

[14]  Widyawan,et al.  Two-Phase Security Protection for the Internet of Things Object , 2018, J. Inf. Process. Syst..

[15]  Shailendra Rathore,et al.  CIoT-Net: a scalable cognitive IoT based smart city network architecture , 2019, Human-centric Computing and Information Sciences.

[16]  Ling Liu,et al.  A Comparative Study of Containers and Virtual Machines in Big Data Environment , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[17]  Neeraj Kumar,et al.  An Energy-Efficient Cache Localization Technique for D2D Communication in IoT Environment , 2021, IEEE Internet of Things Journal.

[18]  Jong Hyuk Park,et al.  BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence , 2020, Future Gener. Comput. Syst..

[19]  Yi Pan,et al.  Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks , 2019, Symmetry.

[20]  Sudhir Kumar,et al.  Handling Device Heterogeneity and Orientation Using Multistage Regression for GMM Based Localization in IoT Networks , 2019, IEEE Access.

[21]  Félix J. García Clemente,et al.  A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.

[22]  Mikail Mohammed Salim,et al.  A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions , 2021 .

[23]  Shaohuai Shi,et al.  Performance Evaluation of Deep Learning Tools in Docker Containers , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).

[24]  Hai Anh Tran,et al.  A LSTM based framework for handling multiclass imbalance in DGA botnet detection , 2018, Neurocomputing.

[25]  Ali Dehghantanha,et al.  BoTShark: A Deep Learning Approach for Botnet Traffic Detection , 2018 .

[26]  Dong-Min Park,et al.  S-mote: SMART Home Framework for Common Household Appliances in IoT Network , 2019, J. Inf. Process. Syst..

[27]  Vincenzo Loia,et al.  VPNFilter Malware Analysis on Cyber Threat in Smart Home Network , 2019, Applied Sciences.

[28]  Yousaf Bin Zikria,et al.  Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution , 2019, Sensors.

[29]  Mamoun Alazab,et al.  A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.

[30]  Jose M. Alcaraz Calero,et al.  Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks , 2019, J. Netw. Comput. Appl..

[31]  Brij B. Gupta,et al.  Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.

[32]  Dilip Kumar,et al.  IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication , 2020, International Journal of Wireless Information Networks.

[33]  Jong Hyuk Park,et al.  Distributed denial of service attacks and its defenses in IoT: a survey , 2019, The Journal of Supercomputing.

[34]  Jason C. Hung,et al.  Feature selection with modified lion's algorithms and support vector machine for high-dimensional data , 2018, Appl. Soft Comput..

[35]  Amir Masoud Rahmani,et al.  Trust-based recommendation systems in Internet of Things: a systematic literature review , 2019, Human-centric Computing and Information Sciences.

[36]  M. Carmen Fernández Gago,et al.  A model-driven approach to ensure trust in the IoT , 2020, Hum. centric Comput. Inf. Sci..

[37]  Qinghe Du,et al.  Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network , 2021, IEEE Transactions on Industrial Informatics.

[38]  Tassos Dimitriou,et al.  Container Security: Issues, Challenges, and the Road Ahead , 2019, IEEE Access.