A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection.

Promise Ricardo Agbedanu, Shanchieh Jay Yang, Richard Musabe, Ignace Gatare, James Rwigema
Author Information
  1. Promise Ricardo Agbedanu: African Centre of Excellence for Internet of Things, University of Rwanda, Kigali P.O. Box 4285, Rwanda. ORCID
  2. Shanchieh Jay Yang: Institute for Informatics and Applied Technology, Gonzaga University, Spokane, WA 99258, USA.
  3. Richard Musabe: College of Science and Technology, University of Rwanda, Kigali P.O. Box 4285, Rwanda.
  4. Ignace Gatare: College of Science and Technology, University of Rwanda, Kigali P.O. Box 4285, Rwanda.
  5. James Rwigema: African Centre of Excellence for Internet of Things, University of Rwanda, Kigali P.O. Box 4285, Rwanda.

Abstract

The Internet of Things (IoT) and Industrial Internet of Things (IIoT) have drastically transformed industries by enhancing efficiency and flexibility but have also introduced substantial cybersecurity risks. The rise of zero-day attacks, which exploit unknown vulnerabilities, poses significant threats to these interconnected systems. Traditional signature-based intrusion detection systems (IDSs) are insufficient for detecting such attacks due to their reliance on pre-defined attack signatures. This study investigates the effectiveness of Adaptive SAMKNN, an adaptive k-nearest neighbor with self-adjusting memory (SAM), in detecting and responding to various attack types in Internet of Things (IoT) environments. Through extensive testing, our proposed method demonstrates superior memory efficiency, with a memory footprint as low as 0.05 MB, while maintaining high accuracy and F1 scores across all datasets. The proposed method also recorded a detection rate of 1.00 across all simulated zero-day attacks. In scalability tests, the proposed technique sustains its performance even as data volume scales up to 500,000 samples, maintaining low CPU and memory consumption. However, while it excels under gradual, recurring, and incremental drift, its sensitivity to sudden drift highlights an area for further improvement. This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. Our proposed method has the potential to significantly increase the security of IoT and IIoT environments by enabling the real-time, scalable, and efficient detection of sophisticated cyber threats, thereby safeguarding critical interconnected systems against emerging vulnerabilities.

Keywords

References

  1. Sensors (Basel). 2022 Jul 27;22(15): [PMID: 35957178]
  2. Sensors (Basel). 2024 May 18;24(10): [PMID: 38794075]

Grants

  1. 000000000/Partnership for Applied Skills in Sciences, Engineering and Technology-Regional Scholarship and Innovation Fund
  2. 0000000/Carnegie Corporation of New York
  3. 0000000/Google PhD Fellowship Programme

Word Cloud

Created with Highcharts 10.0.0ThingsInternetdetectionIoTattacksmemoryproposedIndustrialIIoTzero-daysystemsAdaptivemethodefficiencyalsocybersecurityvulnerabilitiesthreatsinterconnectedintrusiondetectingattackstudySAMKNNenvironmentslowmaintainingacrossdriftreal-timescalablesecuritydrasticallytransformedindustriesenhancingflexibilityintroducedsubstantialrisksriseexploitunknownposessignificantTraditionalsignature-basedIDSsinsufficientduereliancepre-definedsignaturesinvestigateseffectivenessadaptivek-nearestneighborself-adjustingSAMrespondingvarioustypesextensivetestingdemonstratessuperiorfootprint005MBhighaccuracyF1scoresdatasetsrecordedrate100simulatedscalabilityteststechniquesustainsperformanceevendatavolumescales500000samplesCPUconsumptionHoweverexcelsgradualrecurringincrementalsensitivitysuddenhighlightsareaimprovementconfirmsfeasibilitymemory-efficientsolutionprovidingreliableanomalywithoutoverwhelmingcomputationalresourcespotentialsignificantlyincreaseenablingefficientsophisticatedcybertherebysafeguardingcriticalemergingScalableApproachSecurity:EvaluatingSelf-AdjustingMemoryK-NearestNeighborZero-DayAttackDetectioniInternetsystemonlinemachinelearning

Similar Articles

Cited By