| Literature DB >> 36015892 |
Mikail Mohammed Salim1, Alowonou Kowovi Comivi1, Tojimurotov Nurbek1, Heejae Park1, Jong Hyuk Park1.
Abstract
Resource constraints in the Industrial Internet of Things (IIoT) result in brute-force attacks, transforming them into a botnet to launch Distributed Denial of Service Attacks. The delayed detection of botnet formation presents challenges in controlling the spread of malicious scripts in other devices and increases the probability of a high-volume cyberattack. In this paper, we propose a secure Blockchain-enabled Digital Framework for the early detection of Bot formation in a Smart Factory environment. A Digital Twin (DT) is designed for a group of devices on the edge layer to collect device data and inspect packet headers using Deep Learning for connections with external unique IP addresses with open connections. Data are synchronized between the DT and a Packet Auditor (PA) for detecting corrupt device data transmission. Smart Contracts authenticate the DT and PA, ensuring malicious nodes do not participate in data synchronization. Botnet spread is prevented using DT certificate revocation. A comparative analysis of the proposed framework with existing studies demonstrates that the synchronization of data between the DT and PA ensures data integrity for the Botnet detection model training. Data privacy is maintained by inspecting only Packet headers, thereby not requiring the decryption of encrypted data.Entities:
Keywords: blockchain; botnet detection; cybersecurity; digital twin; smart contracts
Mesh:
Year: 2022 PMID: 36015892 PMCID: PMC9412983 DOI: 10.3390/s22166133
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Comparative Analysis of the proposed scheme with related research.
| References | Mechanism | Data Security | Data Integrity | Data Privacy | Availability | Non-Repudiation |
|---|---|---|---|---|---|---|
| Popoola et al. [ | Federated Learning | Model is trained locally on devices | Poison attacks affect data integrity | Only local model gradients trained at the device are shared with the network | Device availability is not addressed in this study | Non-repudiation is not addressed in this study |
| Hussain et al. [ | Dual Machine Learning | Data transmitted to centralized server is exposed to man-in-the-middle attacks | Machine Learning models train using compromised data | Data in transmission is exposed to man-in-the-middle attacks | Arithmetic operations are performed over an untrusted cloud server exposing computation process | Records of infected device are not maintained |
| Trajanovski et al. [ | Honeypot | Delayed identification of compromised devices does not address data security | Delayed identification of compromised devices does not address data integrity | Delayed identification of compromised devices does not address data privacy | The research does not address device availability | Records of infected device are not maintained |
| Vinayakumar et al. [ | Deep Learning using DNS Query | Man-in-the-middle attacks compromise data upload for model training | Man-in-the-middle attacks transmit corrupt data in transmission | Pseudo IDs preserve the privacy of users | The research does not address device availability requirement | Records of infected device are not maintained |
| Hayat et al. [ | Machine Learning and Blockchain | Data is securely stored in Blockchain | Malicious devices are preregistered in the Blockchain network, transmitting compromised data to the Machine Learning model | Privacy of users are maintained by verifying identities at both the Edge and the cloud layer using dual signatures and identifiers | Malicious devices are ejected from the network | The study does not address recording of compromised devices. |
| Lekssays et al. [ | Blockchain | Data is securely stored in Blockchain | Blockchain validates devices allowed to transmit data | Privacy of data is not addressed in the study | The study does not prevent spreading of botnet script | The study does not address recording of compromised devices |
| Sun et al. [ | Blockchain and Encryption | Data storage in Blockchain prevents data manipulation | Public key-based authentication prevents corrupt data upload | The study does not address Data Privacy | The study does not prevent spreading of botnet script | Device information is stored in Blockchain for traceability |
| Xu et al. [ | Blockchain and Smart Contracts | Consensus algorithm ensures stored data security | Infected IoT bots transmit data for anomaly detection | Secret keys provided to authorized members access data. | The study does not prevent spreading of botnet script | Device information is stored in Blockchain for traceability |
| Proposed scheme | Digital Twin and Blockchain | Authorized and registered Digital Twins share data | Synchronization between the Digital Twin and Packet Auditor verifies data transmission | Inspection of Packet Headers enables inspection of encrypted IP packets | Certificate revocation of Digital Twins prevents Botnet from spreading | IP address of infected devices are stored in the Blockchain |
Notation table for abbreviations used in the framework.
| No. | Term | Description |
|---|---|---|
| 1. | DT | Digital Twin |
| 2. |
| Production Floor Digital Twin |
| 3. |
| Raw Material Management Digital Twin |
| 4. |
| Assembly Line Digital Twin |
| 5. |
| Packaging and Warehousing Digital Twin |
| 6. | HTTPS | Hypertext Transfer Protocol Secure |
| 7. | SSL | Secure Socket Layer |
| 9. | UDP | User Datagram Protocol |
| 10. | IP | Internet Protocol |
| 11. | PA | Packet Auditor |
| 12. |
| Packet Auditor ID |
| 13. |
| Transaction |
| 14. |
| Digital Twin Certificate |
| 15. |
| Packet Auditor Public Key |
| 16. |
| Packet Auditor Private Key |
| 17. |
| Digital Twin Public Key |
| 18. |
| Digital Twin Private Key |
| 19. |
| Digital Twin Profile |
| 20. |
| Device ID |
| 21. |
| IP Packet Source |
| 22. |
| IP Packet Destination |
| 23. |
| Timestamp of captured packet |
| 24. |
| Upper Time Boundary |
| 25. |
| Lower Time Boundary |
| 26. |
| Physical Twin |
| 27. | DL | Deep Learning |
| 28. | ACK | Acknowledgement Packet |
| 29. | SYN | Synchronize Packet |
| 30. | C&C | Command and Control |
| 31. | LSTM | Long-Short-Term Memory |
Figure 1Blockchain-enabled Secure Digital Twin framework overview.
Figure 2Packet Auditor and Digital Twin registration.
Figure 3Digital Twin synchronization.
Figure 4(a) DT Synchronization with PT; (b) CPU utilization.
Analysis of Synchronization Latency.
| Parameters | Models | 1000 | 2000 | 3000 | 4000 | 5000 | 6000 |
|---|---|---|---|---|---|---|---|
| Latency (ms) | PT | 6.844 | 6.845 | 6.853 | 6.868 | 6.875 | 6.882 |
| DT | 6.846 | 6.847 | 6.856 | 6.870 | 6.877 | 6.884 |
Analysis of Synchronization CPU consumption.
| Parameters | Time (ms) | 500 | 1000 | 1500 | 2000 | 2500 | 3000 | 3500 | 4000 | 4500 | 5000 | 5500 | 6000 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CPU Consumption (%) | PT | 19.74 | 22.65 | 23.67 | 24.34 | 26.42 | 29.76 | 31.54 | 33.78 | 35.70 | 37.89 | 42.55 | 45.22 |
| DT | 19.00 | 22.00 | 23.00 | 24.00 | 26.00 | 29.00 | 31.00 | 33.00 | 35.00 | 37.43 | 41.77 | 44.65 |
Figure 5(a) PA packet analysis; (b) CPU utilization of PA.
Analysis of in Latency and CPU consumption.
| Parameters | Models | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|---|
| Latency (s) | Baseline model | 2.078 | 2.205 | 2.427 | 2.647 | 2.738 | 2.886 | 3.117 | 3.428 |
| Proposed Framework | 2.1 | 2.21 | 2.43 | 2.65 | 2.74 | 2.89 | 3.12 | 3.43 | |
| CPU Consumption (%) | Baseline model | 22 | 23 | 25 | 26.6 | 27.9 | 29 | 31 | 33 |
| Proposed Framework | 15 | 17 | 17.6 | 19 | 21 | 22 | 25 | 27 |
Figure 6Comparison with existing studies based on block transaction speed.
Figure 7Comparison analysis of consensus algorithms to DDoS attacks.
Figure 8Comparison analysis of accuracy in botnet detection with Popoola.
Quantitative Analysis of the Botnet-detection model with existing research.
| Models | Accuracy | Precision | Recall | F1 Score |
|---|---|---|---|---|
| Proposed model | 99.97 | 99.32 | 97.54 | 98.11 |
| Popoola et al. [ | 99.93 | 99.08 | 96.97 | 97.96 |
| Hussain et al. [ | 98.85 | 98.95 | 98.66 | 98.81 |
| Vinayakumar et al. [ | 89.90 | 93.94 | 90.5 | 91.9 |