Base paper Title: A Measurement Approach for Inline Intrusion Detection of Heartbleed-Like
Attacks in IoT Frameworks
Modified Title: A Measuring Method for Inline Intrusion Detection of Attacks Similar to
Heartbleed in Internet of Things Frameworks
Abstract
Cyber security is one of the most crucial aspects of the Internet of Things (IoT). Among
the possible threats, great interest is today paid toward the possible capturing of information
caused by external attacks on both client and server sides. Whatever the IoT application, the
involved nodes are exposed to cyberattacks mainly through the vulnerability of either the
sensor nodes themselves (if they have the capabilities for networking operativity) or the IoT
gateways, which are the devices able to create the link between the local nodes of the IoT
network, and the wide area networks. Due to the low-cost constraints typical of many IoT
applications, the IoT sensor nodes and IoT gateways are often developed on low-performance
processing units, in many cases customized for the specific application, and thus not easy to
update against new cyber threats that are continuously identified. In the framework of
cyberattacks aimed at capturing sensitive information, one of the most known was the
heartbleed, which, has allowed attackers to remotely read protected memory from an estimated
24%–55% of popular HTTPS sites. To overcome such a problem, which was due to a bug of
the OpenSSL, a suitable patch was quickly released, thus allowing to avoid the problem in most
of the cases. However, IoT devices may require more advanced mitigation techniques, because
they are sometimes unable to be patched for several practical reasons. In this scenario, the
article proposes a novel measurement method for inline detecting intrusions due to heartbleed
and heartbleed-like attacks. The proposed solution is based on an effective rule which does not
require decoding the payload and that can be implemented on a lowperformance general-
purpose processing unit. Therefore, it can be straightforwardly implemented and included in
either IoT sensor nodes or IoT gateways. The realized system has been tested and validated on
a number of experiments carried out on a real network, showing performance comparable (in
some cases better) with the heavier machine learning-based methods.
Existing System
N ETWORK security monitoring and measurements are commonly used methodologies in information
security operation centers. The network traffic is captured by means of suitable measurement probes
and the related logs are monitored to detect any illegal activities within the network [1], [2]. Intrusion
detection systems (IDSs) are automatic systems specifically designed for identifying threats that are
able to potentially create damage to information systems as data leakages, Distributed Denial of
Service (DDoS), Bad Data Injection, to cite a few, and in different contexts of application [3], [4], [5],
[6], [7]. Recent trends of cyberattacks go toward Internet of Things (IoT) and operational technology
(OT) infrastructure which will involve more and more targets including critical infrastructures,
traditional manufacturing facilities, even smart home networks, in the next years. Due to the
prevalence of employees managing these systems via remote access, which provides a very good entry
point for cybercriminals, it is expected that attackers will target industrial sensors to cause physical
damage that could result in assembly lines shutting down or services being interrupted [8].
Drawback in Existing System
ď‚· Complexity: Implementing a measurement approach for inline intrusion detection can
be complex and time-consuming. It requires expertise and knowledge of network
protocols, intrusion detection systems, and measurement techniques. This complexity
can increase the chances of errors and mistakes during the implementation phase.
ď‚· Resource-intensive: Inline intrusion detection requires significant computing resources
and network bandwidth to perform real-time analysis and detection of malicious
activities. This can lead to higher operational costs and the need for specialized
hardware infrastructure to handle the increased load.
ď‚· False positives and negatives: Measurement approaches for inline intrusion detection
may produce false positives, i.e., identify legitimate traffic as malicious, or false
negatives, i.e., fail to detect actual intrusions. These inaccuracies can impact the overall
effectiveness and reliability of the intrusion detection system.
ď‚· Privacy concerns: Inline intrusion detection relies on inspecting and analyzing network
traffic in real-time, which can pose privacy concerns. This approach requires
monitoring and inspecting the content of network packets, potentially exposing
sensitive and confidential information to the intrusion detection system.
Proposed System
ď‚· The proposed approach is widely applicable to protect heart bleed but also other attacks
dealing with data breach.
ď‚· Proposed results and methodology allow discussing about the possible extension of the
work in more general and complex frameworks of Cyber Security, by analzing both the
level of generalization and the likelihood of the considered kind of attacks.
ď‚· we proposed a flowby-flow evaluation of the parameters of interest for developing the
rules described in the following. In other words, considering the parameters measured
by CICFlowMeter at each flow, they are used for evaluating the involved quantities.
ď‚· As for the proposed rule-based approach, it has shown a very good performance,
comparable with DT and RF, in terms of precision and specificity and a little bit worse,
but better than the other considered ML algorithms, in terms of accuracy, sensitivity,
and F1–score.
Algorithm
ď‚· In fact, it has shown an execution time that is more than 5 times shorter than that
experienced when the Decision Tree algorithm has been considered.
ď‚· Analyzing these results, it is possible to note that the ML algorithms that have shown
the better performance are Random
 Performance comparison among the above–mentioned ML algorithms
Advantages
ď‚· Real-time detection: The measurement approach allows for real-time detection of
intrusions as it operates directly in the communication path of the data [1]. This
means that any incoming traffic can be analyzed and checked for security threats
immediately.
ď‚· By being inline, the measurement approach provides granular visibility into the
network traffic. It can capture and analyze each packet of data, allowing for detailed
inspection and detection of potential intrusions
ď‚· The measurement approach utilizes statistical anomaly-based detection, which
compares incoming traffic against a predetermined baseline of normal behaviour. This
enables accurate detection of deviations from normal patterns, which may indicate an
intrusion
ď‚· In addition to anomaly detection, the measurement approach can also incorporate
signature-based detection. By maintaining a database of known code exploits, it can
quickly identify and eliminate known threats
Software Specification
ď‚· Processor : I3 core processor
ď‚· Ram : 4 GB
ď‚· Hard disk : 500 GB
Software Specification
ď‚· Operating System : Windows 10 /11
ď‚· Frond End : Python
ď‚· Back End : Mysql Server
ď‚· IDE Tools : Pycharm

More Related Content

PPTX
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
PDF
ML_project_proposal for my university.pdf
PDF
A novel deep anomaly detection approach for intrusion detection in futuristic...
PDF
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
PDF
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
PDF
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
PDF
IRJET-A Hybrid Intrusion Detection Technique based on IRF & AODE for KDD-CUP ...
PDF
Certified Ethical Hacking
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
ML_project_proposal for my university.pdf
A novel deep anomaly detection approach for intrusion detection in futuristic...
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IRJET-A Hybrid Intrusion Detection Technique based on IRF & AODE for KDD-CUP ...
Certified Ethical Hacking

Similar to A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Attacks_in_IoT_Frameworks.docx (20)

PDF
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
PDF
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
PDF
Detecting network attacks model based on a convolutional neural network
PDF
Network intrusion detection in big datasets using Spark environment and incre...
PDF
Network intrusion detection in big datasets using Spark environment and incre...
PDF
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
PDF
Intrusion Detection System Using Machine Learning: An Overview
DOCX
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
PDF
Survey of Clustering Based Detection using IDS Technique
PDF
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
PDF
COMPARATIVE ANALYSIS OF FEATURE SELECTION TECHNIQUES FOR LSTM BASED NETWORK I...
PDF
Autonomic Anomaly Detection System in Computer Networks
PPTX
Network Intrusion Detection (1)-converted-1.pptx
PDF
Machine learning-based intrusion detection system for detecting web attacks
PDF
research project Generative oversasmling
PDF
Hyperparameters optimization XGBoost for network intrusion detection using CS...
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
PDF
Application of neural network and PSO-SVM in intrusion detection of network
PDF
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTIO...
PDF
IRJET- Genetic Algorithm based Intrusion Detection-Survey
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine ...
WEB ATTACK PREDICTION USING STEPWISE CONDITIONAL PARAMETER TUNING IN MACHINE ...
Detecting network attacks model based on a convolutional neural network
Network intrusion detection in big datasets using Spark environment and incre...
Network intrusion detection in big datasets using Spark environment and incre...
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
Intrusion Detection System Using Machine Learning: An Overview
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Survey of Clustering Based Detection using IDS Technique
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
COMPARATIVE ANALYSIS OF FEATURE SELECTION TECHNIQUES FOR LSTM BASED NETWORK I...
Autonomic Anomaly Detection System in Computer Networks
Network Intrusion Detection (1)-converted-1.pptx
Machine learning-based intrusion detection system for detecting web attacks
research project Generative oversasmling
Hyperparameters optimization XGBoost for network intrusion detection using CS...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
Application of neural network and PSO-SVM in intrusion detection of network
PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTIO...
IRJET- Genetic Algorithm based Intrusion Detection-Survey
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ad

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
History, Philosophy and sociology of education (1).pptx
 
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
 
Weekly quiz Compilation Jan -July 25.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Complications of Minimal Access-Surgery.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
TNA_Presentation-1-Final(SAVE)) (1).pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Cambridge-Practice-Tests-for-IELTS-12.docx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
History, Philosophy and sociology of education (1).pptx
 
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
What if we spent less time fighting change, and more time building what’s rig...
B.Sc. DS Unit 2 Software Engineering.pptx
Trump Administration's workforce development strategy
Share_Module_2_Power_conflict_and_negotiation.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
 

A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Attacks_in_IoT_Frameworks.docx

  • 1. Base paper Title: A Measurement Approach for Inline Intrusion Detection of Heartbleed-Like Attacks in IoT Frameworks Modified Title: A Measuring Method for Inline Intrusion Detection of Attacks Similar to Heartbleed in Internet of Things Frameworks Abstract Cyber security is one of the most crucial aspects of the Internet of Things (IoT). Among the possible threats, great interest is today paid toward the possible capturing of information caused by external attacks on both client and server sides. Whatever the IoT application, the involved nodes are exposed to cyberattacks mainly through the vulnerability of either the sensor nodes themselves (if they have the capabilities for networking operativity) or the IoT gateways, which are the devices able to create the link between the local nodes of the IoT network, and the wide area networks. Due to the low-cost constraints typical of many IoT applications, the IoT sensor nodes and IoT gateways are often developed on low-performance processing units, in many cases customized for the specific application, and thus not easy to update against new cyber threats that are continuously identified. In the framework of cyberattacks aimed at capturing sensitive information, one of the most known was the heartbleed, which, has allowed attackers to remotely read protected memory from an estimated 24%–55% of popular HTTPS sites. To overcome such a problem, which was due to a bug of the OpenSSL, a suitable patch was quickly released, thus allowing to avoid the problem in most of the cases. However, IoT devices may require more advanced mitigation techniques, because they are sometimes unable to be patched for several practical reasons. In this scenario, the article proposes a novel measurement method for inline detecting intrusions due to heartbleed and heartbleed-like attacks. The proposed solution is based on an effective rule which does not require decoding the payload and that can be implemented on a lowperformance general- purpose processing unit. Therefore, it can be straightforwardly implemented and included in either IoT sensor nodes or IoT gateways. The realized system has been tested and validated on a number of experiments carried out on a real network, showing performance comparable (in some cases better) with the heavier machine learning-based methods. Existing System
  • 2. N ETWORK security monitoring and measurements are commonly used methodologies in information security operation centers. The network traffic is captured by means of suitable measurement probes and the related logs are monitored to detect any illegal activities within the network [1], [2]. Intrusion detection systems (IDSs) are automatic systems specifically designed for identifying threats that are able to potentially create damage to information systems as data leakages, Distributed Denial of Service (DDoS), Bad Data Injection, to cite a few, and in different contexts of application [3], [4], [5], [6], [7]. Recent trends of cyberattacks go toward Internet of Things (IoT) and operational technology (OT) infrastructure which will involve more and more targets including critical infrastructures, traditional manufacturing facilities, even smart home networks, in the next years. Due to the prevalence of employees managing these systems via remote access, which provides a very good entry point for cybercriminals, it is expected that attackers will target industrial sensors to cause physical damage that could result in assembly lines shutting down or services being interrupted [8]. Drawback in Existing System ď‚· Complexity: Implementing a measurement approach for inline intrusion detection can be complex and time-consuming. It requires expertise and knowledge of network protocols, intrusion detection systems, and measurement techniques. This complexity can increase the chances of errors and mistakes during the implementation phase. ď‚· Resource-intensive: Inline intrusion detection requires significant computing resources and network bandwidth to perform real-time analysis and detection of malicious activities. This can lead to higher operational costs and the need for specialized hardware infrastructure to handle the increased load. ď‚· False positives and negatives: Measurement approaches for inline intrusion detection may produce false positives, i.e., identify legitimate traffic as malicious, or false negatives, i.e., fail to detect actual intrusions. These inaccuracies can impact the overall effectiveness and reliability of the intrusion detection system. ď‚· Privacy concerns: Inline intrusion detection relies on inspecting and analyzing network traffic in real-time, which can pose privacy concerns. This approach requires monitoring and inspecting the content of network packets, potentially exposing sensitive and confidential information to the intrusion detection system. Proposed System
  • 3. ď‚· The proposed approach is widely applicable to protect heart bleed but also other attacks dealing with data breach. ď‚· Proposed results and methodology allow discussing about the possible extension of the work in more general and complex frameworks of Cyber Security, by analzing both the level of generalization and the likelihood of the considered kind of attacks. ď‚· we proposed a flowby-flow evaluation of the parameters of interest for developing the rules described in the following. In other words, considering the parameters measured by CICFlowMeter at each flow, they are used for evaluating the involved quantities. ď‚· As for the proposed rule-based approach, it has shown a very good performance, comparable with DT and RF, in terms of precision and specificity and a little bit worse, but better than the other considered ML algorithms, in terms of accuracy, sensitivity, and F1–score. Algorithm ď‚· In fact, it has shown an execution time that is more than 5 times shorter than that experienced when the Decision Tree algorithm has been considered. ď‚· Analyzing these results, it is possible to note that the ML algorithms that have shown the better performance are Random ď‚· Performance comparison among the above–mentioned ML algorithms Advantages ď‚· Real-time detection: The measurement approach allows for real-time detection of intrusions as it operates directly in the communication path of the data [1]. This means that any incoming traffic can be analyzed and checked for security threats immediately. ď‚· By being inline, the measurement approach provides granular visibility into the network traffic. It can capture and analyze each packet of data, allowing for detailed inspection and detection of potential intrusions ď‚· The measurement approach utilizes statistical anomaly-based detection, which compares incoming traffic against a predetermined baseline of normal behaviour. This enables accurate detection of deviations from normal patterns, which may indicate an intrusion ď‚· In addition to anomaly detection, the measurement approach can also incorporate signature-based detection. By maintaining a database of known code exploits, it can quickly identify and eliminate known threats
  • 4. Software Specification ď‚· Processor : I3 core processor ď‚· Ram : 4 GB ď‚· Hard disk : 500 GB Software Specification ď‚· Operating System : Windows 10 /11 ď‚· Frond End : Python ď‚· Back End : Mysql Server ď‚· IDE Tools : Pycharm