Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Hasan MD Mehedy, Tan Yubo
DOI Link: https://doi.org/10.22214/ijraset.2024.61393
Certificate: View Certificate
As people are looking for a more comfortable life, IoT applications are coming to play. Smart home system is one of the most popular IoT applications in the last decade. A smart home network is crucial to function smart home system properly. Cyber attacks on a smart home network can damage a lot. Network intrusion detection and prevention system (NIDPS) is a good solution to protect against Cyber threat in smart home network. This research will implement hybrid NIDPS in smart home network by combining signature based and anomaly-detection based NIDPS. This hybrid NIDPS will prevent known known attack from public internet, local internet and zero-day attack. Also, this system will be able to reduce false positive result and improve signature based NIDPS rules accurately by manual inspection.
I. INTRODUCTION
Smart home technology allows users to remotely control various features such as temperature, lighting, and security through internet-connected devices, providing convenience and flexibility. However, the increasing popularity of Smart Home Internet of Things (IoT) devices also brings the risk of cyberattacks [1]. These attacks can result in the theft of sensitive information, financial loss, and even jeopardize user safety. Traditional methods of protection, such as firewalls, are often ineffective against insider threats, requiring alternative solutions. Intrusion Detection and Prevention Systems (IDPS) are essential in safeguarding smart home networks from cyber threats [4, 5]. These systems continuously monitor network traffic for any suspicious activity, notifying administrators and potentially preventing attacks. By examining data packets, IDPS can identify and block malicious traffic. There are two main types of IDPS: host-based and network-based (NIDPS). NIDPS specifically focuses on network traffic and comes in two primary forms: Signature-based NIDPS (SNIDPS) and Anomaly Detection-based NIDPS (ADNIDPS). This study proposes a hybrid approach to NIDPS that combines both SNIDPS and ADNIDPS for improved security. The use of Proofpoint Emerging Threats Rules will ensure up-to-date signature files for SNIDPS, while Artificial Intelligence will be utilized for anomaly detection in ADNIDPS. After reviewing existing literature, this research will outline the proposed system's strategy, implementation process, and performance evaluation.
A. Background of Study
The internet's widespread presence has significantly changed modern life. Whether we are at home, in a busy office, or in an educational institution, we heavily rely on internet connectivity to simplify our daily tasks. This trend is exemplified by smart homes, which allow for remote control of appliances, cameras, sensors, and other devices through internet-connected devices such as mobiles, tablets, computers, and even voice or gesture commands. However, this interconnectedness also presents a potential threat. Cybercriminals can exploit these vulnerabilities to gain unauthorized access to sensitive information, resulting in financial loss, data breaches, and even compromising personal safety [6-8]. To protect local networks from cyberattacks, it is crucial to implement robust security measures [9, 10]. This threat extends beyond external attacks, as malicious actors within your home's vicinity can also attempt to infiltrate your local network by exploiting your Wi-Fi. While traditional firewalls are essential for defending against threats from the public internet, they do have limitations. They struggle to detect new attack methods and offer minimal protection against internal network threats within smart homes [11, 12]. As a solution, network-based intrusion detection and prevention systems (NIDPS) have emerged, capable of identifying and preventing attacks from both the public internet and local smart home networks.
B. Literature Review
NIDPS (Network Intrusion Detection and Prevention Systems) are crucial for protecting networks against cyberattacks. These systems continuously monitor network traffic and analyze it for any suspicious activity that may indicate a potential threat or intruder [4, 5]. NIDPS use two main methods for detecting attacks: signature-based and anomaly-based. Signature-based NIDPS (SNIDPS) works like a digital fingerprint scanner for network traffic. It maintains a database of known attack signatures, which are unique patterns associated with specific cyberattacks. When a data packet arrives, the SNIDPS compares its signature to the database and triggers an alert and potentially blocks the packet if there is a match, thus preventing the attack from occurring [13, 14]. SNIDPS has a high accuracy rate in detecting previously encountered attacks, but it struggles with identifying new or zero-day attacks that have not been documented yet. On the other hand, anomaly-based NIDPS (ADNIDPS) uses artificial intelligence (AI) to establish a baseline for normal network traffic patterns. By analyzing historical data, ADNIDPS trains a machine learning model to recognize deviations from the established baseline. Significant deviations are flagged as potential anomalies, which could indicate an ongoing cyberattack [15-17]. ADNIDPS overcomes the limitation of SNIDPS by detecting zero-day attacks, providing a valuable layer of defense against evolving threats. However, a common challenge with ADNIDPS is generating false positives, which occur when legitimate traffic is wrongly identified as malicious, leading to unnecessary alerts and potential disruptions in network operations. To address the limitations of both SNIDPS and ADNIDPS, researchers have explored combining these techniques to create a more robust defense system, known as Hybrid Network Intrusion Detection and Prevention Systems (HNIDPS). HNIDPS typically employ a layered approach, with the first layer using SNIDPS to efficiently detect and block known attacks, while the second layer uses ADNIDPS to identify anomalies indicative of new attacks. Some HNIDPS also incorporate a central database to store attack signatures, which can be updated dynamically with new threats identified by the ADNIDPS, improving threat coverage without manual intervention [18]. However, this approach also introduces the risk of perpetuating false positives, as the SNIDPS may block safe traffic if the ADNIDPS wrongly identifies it as malicious and adds it to the database. Even if the AI model in ADNIDPS improves in the future, the SNIDPS may still trigger alerts or block such packets based on outdated information in the database. Additionally, current hybrid NIDPS designs do not have a method to identify and address these false positives, hindering the learning process of the system. Some researchers have proposed alternative hybrid NIDPS designs that eliminate the dependency on a central database [19]. This research expands on these ideas by introducing a new hybrid NIDPS architecture with two key functionalities: Manual Threat Inspection and Known False Positive Database. Manual Threat Inspection allows for manual analysis of potential threats identified by ADNIDPS, and confirmed threats can be added to the SNIDPS signature database for efficient future detection. The Known False Positive Database is a dedicated database that stores verified false positives identified by the system, serving as a reference for the SNIDPS to prevent it from mistakenly blocking legitimate traffic based on outdated information. This enhanced hybrid NIDPS design aims to address the limitations of existing systems by reducing false positives, improving overall accuracy, and facilitating a more efficient learning process for the AI model used in ADNIDPS.
II. RESEARCH METHODOLOGY
This study presents a unique Hybrid Network Intrusion Detection and Prevention System (HNIDPS) specially designed to secure smart home networks. The system utilizes a combination of signature-based and anomaly-based detection techniques to provide comprehensive protection against both known and unknown cyberattacks.
A. Architecture
The HNIDPS architecture is illustrated in Fig. 1. All incoming and outgoing traffic within the smart home network is directed to the NIDPS for inspection. The MitmProxy tool serves as a central traffic inspection point, enabling efficient analysis of data packets.
B. Workflow for Data Packet Inspection
The workflow for data packet inspection utilized by the HNIDPS is explained below:
C. Inspection of New Threats/Intruders by ADNIDPS
The process followed by the ADNIDPS component to inspect and incorporate newly discovered threat’s workflow can be summarized as follows:
III. SYSTEM DESIGN
The effectiveness of a Hybrid Network Intrusion Detection and Prevention System (HNIDPS) is dependent on its ability to accurately identify malicious activity within smart home network traffic. This chapter provides an in-depth look at the technical design and architecture of the HNIDPS, outlining the various components that work together to achieve this goal. The discussion begins with the data acquisition and preprocessing stage, where network traffic data from publicly available datasets is carefully prepared for use in the system's AI model. This process involves merging datasets, addressing inconsistencies, and selecting the most informative features for anomaly detection. Next, the rationale behind choosing a Convolutional Neural Network (CNN) as the core AI model for anomaly detection is explained. The chapter then goes into detail about the implementation of the CNN architecture, which includes using a sequential model with Conv1d layers for efficiency. The process of hyperparameter tuning using Optuna, a technique used to optimize the model's performance, is also explored. After the model selection and training, the chapter discusses the design of the PostgreSQL database used by the HNIDPS. This database serves as a central repository for storing various system information, including network traffic details, attack signatures, and user credentials. The development of a RESTful API server using FastAPI is then described. This server acts as a communication bridge, facilitating interaction between the user interface and the database. The functionalities of the API server, such as model creation, route establishment, and secure authentication mechanisms, are also explained. Finally, the chapter discusses the integration of MitmProxy addons to serve as a proxy server within the HNIDPS architecture.
The use of MitmProxy for implementing both signature-based and anomaly-based intrusion detection functionalities is explored. Additionally, the development of the user interface (UI) for interacting with the HNIDPS is discussed. The UI framework and its functionalities are explained, highlighting how users can use the interface to manage the system and monitor network traffic activity within their smart home environment.
A. Data Acquisition and Preprocessing
Effective anomaly detection within the HNIDPS relies on high-quality training data. This subchapter delves into the data acquisition and preprocessing stage, a crucial step in preparing network traffic data for use in the system's AI model. The selection of publicly available datasets, such as CIC-IDS2017 and CIC-DDoS2019, is discussed, highlighting their suitability for training the anomaly detection model. Furthermore, the intricacies of preprocessing this raw data, including merging datasets, addressing inconsistencies, and selecting the most informative features for the model, are explored. This meticulous process ensures that the AI model learns from a comprehensive and well-prepared foundation, ultimately enhancing its ability to identify anomalies within smart home network traffic.
B. Database Design
The HNIDPS relies on a robust database to store and manage various system information. This section will discuss the PostgreSQL database's design, outlining the structure and purpose of each data table. These tables include network traffic data, security alerts, attack signatures, and user credentials. The well-designed database is the central information hub of the HNIDPS, making data storage, retrieval, and management efficient and contributing to the system's overall functionality.
C. RESTful API Server
The HNIDPS utilizes a RESTful API server to facilitate smooth communication between the user interface and PostgreSQL database. In this section, we will delve into the development of this server using the FastAPI framework. We will also explore its functionalities, including model creation, route establishment, and strong authentication mechanisms. The RESTful API server plays a vital role in enabling user interaction and system management within the HNIDPS by providing a secure and well-defined communication channel.
D. Proxy Server
A proxy server serves as an intermediary between the smart home network and the internet in the HNIDPS. This section will explore the implementation of this proxy server and its role in the system's architecture. We will discuss how the proxy server integrates with MitmProxy addons to facilitate traffic inspection and manipulation for intrusion detection purposes. Additionally, we will cover the available configuration options and its role in connecting to the PostgreSQL database for threat signature management.
E. User Interface (UI)
The User Interface (UI) serves as the central hub for user interaction with the HNIDPS, providing various design and functionality features. These components allow users to easily monitor network traffic, view security alerts, manage user accounts, and configure system settings. The intuitive design and informative visualizations of the UI help users understand the HNIDPS's operational status and effectively manage network security in a smart home environment.
In this paper, a Home Network Intrusion Detection and Prevention System (HNIDPS) is introduced as a comprehensive solution for securing smart homes. The system implements a multi-layered architecture that combines signature-based and anomaly-based intrusion detection methods to effectively identify threats. Real-time traffic inspection is enabled through the use of a MitmProxy addon in the proxy server, while a Convolutional Neural Network model is utilized to detect new malicious activities. The secure RESTful API server ensures smooth communication between the user interface and the PostgreSQL database, allowing for efficient management of the system. The user-friendly interface allows users to monitor network traffic, access security alerts, and manage user accounts. By integrating these features, the HNIDPS has the potential to greatly improve the security of smart home networks. Future work could involve extensive testing of the system to validate its effectiveness in real-world situations. Additionally, further development could explore machine learning techniques for more advanced anomaly detection and integration with a wider variety of smart home devices.
[1] S. Zheng, N. Apthorpe, M. Chetty, and N. Feamster, “User perceptions of smart home IoT privacy,” Proceedings of the ACM on human-computer interaction, vol. 2, no. CSCW, pp. 1–20, 2018. [2] A. Lamba, S. Singh, N. Dutta, and S. Rela, “Uses of different cyber security service to prevent attack on smart home infrastructure,” International Journal For Technological Research In Engineering, vol. 1, no. 11, 2014. [3] T. A. Abdullah, W. Ali, S. Malebary, and A. A. Ahmed, “A review of cyber security challenges attacks and solutions for Internet of Things based smart home,” Int. J. Comput. Sci. Netw. Secur, vol. 19, no. 9, p. 139, 2019. [4] A. Patel, Q. Qassim, and C. Wills, “A survey of intrusion detection and prevention systems,” Information Management & Computer Security, vol. 18, no. 4, pp. 277–290, 2010. [5] K. Scarfone, P. Mell, and others, “Guide to intrusion detection and prevention systems (idps),” NIST special publication, vol. 800, no. 2007, p. 94, 2007. [6] M. Uma and G. Padmavathi, “A survey on various cyber attacks and their classification.,” Int. J. Netw. Secur., vol. 15, no. 5, pp. 390–396, 2013. [7] I. Agrafiotis, J. R. Nurse, M. Goldsmith, S. Creese, and D. Upton, “A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate,” Journal of Cybersecurity, vol. 4, no. 1, p. tyy006, 2018. [8] H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Computers & security, vol. 105, p. 102248, 2021. [9] A. Bendovschi, “Cyber-attacks–trends, patterns and security countermeasures,” Procedia Economics and Finance, vol. 28, pp. 24–31, 2015. [10] X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, “Securing smart grid: cyber attacks, countermeasures, and challenges,” IEEE Communications Magazine, vol. 50, no. 8, pp. 38–45, 2012. [11] T. Javid, T. Riaz, and A. Rasheed, “A layer2 firewall for software defined network,” in 2014 Conference on Information Assurance and Cyber Security (CIACS), 2014, pp. 39–42. [12] O. Rysavy, J. Rab, and M. Sveda, “Improving security in SCADA systems through firewall policy analysis,” in 2013 Federated Conference on Computer Science and Information Systems, 2013, pp. 1435–1440. [13] U. A. Sandhu, S. Haider, S. Naseer, and O. U. Ateeb, “A survey of intrusion detection & prevention techniques,” in 2011 International Conference on Information Communication and Management, IPCSIT, 2011, vol. 16, pp. 66–71. [14] V. Kumar and O. P. Sangwan, “Signature based intrusion detection system using SNORT,” International Journal of Computer Applications & Information Technology, vol. 1, no. 3, pp. 35–41, 2012. [15] Y. Sani, A. Mohamedou, K. Ali, A. Farjamfar, M. Azman, and S. Shamsuddin, “An overview of neural networks use in anomaly intrusion detection systems,” in 2009 IEEE Student Conference on Research and Development (SCOReD), 2009, pp. 89–92. [16] S. T. F. Al-Janabi and H. A. Saeed, “A neural network based anomaly intrusion detection system,” in 2011 Developments in E-systems Engineering, 2011, pp. 221–226. [17] U. Ravale, N. Marathe, and P. Padiya, “Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function,” Procedia Computer Science, vol. 45, pp. 428–435, 2015. [18] Z. Chiba, N. Abghour, K. Moussaid, A. E. Omri, and M. Rida, “Newest collaborative and hybrid network intrusion detection framework based on suricata and isolation forest algorithm,” in Proceedings of the 4th international conference on smart city applications, 2019, pp. 1–11. [19] S. Ouiazzane, M. Addou, and F. Barramou, “A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System,” in Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21, 2022, pp. 474–485. [20] L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, “A survey of CNN-based network intrusion detection,” Applied Sciences, vol. 12, no. 16, p. 8162, 2022. [21] J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, “CNN-based network intrusion detection against denial-of-service attacks,” Electronics, vol. 9, no. 6, p. 916, 2020. [22] R. Vinayakumar, K. Soman, and P. Poornachandran, “Applying convolutional neural network for network intrusion detection,” in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, pp. 1222–1228. [23] B. Riyaz and S. Ganapathy, “A deep learning approach for effective intrusion detection in wireless networks using CNN,” Soft Computing, vol. 24, no. 22, pp. 17265–17278, 2020. [24] T. Akiba, S. Sano, T. Yanase, T. Ohta, and M. Koyama, “Optuna: A next-generation hyperparameter optimization framework,” in Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, 2019, pp. 2623–2631. [25] S. Shekhar, A. Bansode, and A. Salim, “A comparative study of hyper-parameter optimization tools,” in 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 2021, pp. 1–6. [26] M. Lathkar, High-Performance Web Apps with FastAPI. Springer, 2023.
Copyright © 2024 Hasan MD Mehedy, Tan Yubo. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET61393
Publish Date : 2024-04-30
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here