학술논문

Identification and Containment of Intrusion Attacks in an IIoT Network based on Machine Learning and Blockchain Technology
Document Type
Conference
Source
2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) Intelligent Data Communication Technologies and Internet of Things (IDCIoT), 2024 2nd International Conference on. :70-77 Jan, 2024
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Privacy
Data privacy
Scalability
Smart contracts
Machine learning
Prediction algorithms
Threat assessment
Internet of Things (IoT)
Blockchain
Machine Learning
Security
Integrity
Intrusion
Intrusion Detection System
Language
Abstract
The Blockchain technology is leveraged to establish a secure and tamper-resistant decentralized ledger, providing a transparent and immutable record of all transactions and communications within the IoT network. By implementing smart contracts, we ensure the integrity and authenticity of device interactions, mitigating the risk of unauthorized access and data manipulation. Complementing the Blockchain, Machine Learning (ML) algorithms are employed to analyze and identify patterns indicative of malicious activities. The proposed system employs anomaly detection models, trained on historical data, to continuously monitor and adapt to emerging threats. This dynamic threat detection mechanism enhances the ability of the IoT network to recognize and respond to sophisticated intrusion attempts in real-time. Furthermore, the proposed framework incorporates a decentralized identity management system using Blockchain, ensuring that only authenticated and authorized devices can participate in the IoT network. This not only safeguards against unauthorized access but also protects the privacy and integrity of the data generated and exchanged by IoT devices. To validate the effectiveness of our approach, we conducted experiments in a simulated IoT environment, considering various attack scenarios. The results demonstrate a significant improvement in the overall security posture of the IoT network, with reduced false positives and swift identification of intrusions. In conclusion, the integration of Blockchain and ML techniques provides a robust and adaptive defense mechanism for IoT device networks. This holistic approach addresses the challenges of security, privacy, and data integrity, paving the way for a more resilient and trustworthy IoT ecosystem in the face of evolving cyber threats.