With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is building a network of Internet-enabled devices. The concept of IoT is employed in almost all fields such as healthcare, smart-cities, smart-grids, energy distribution, agriculture, and even transportation. In a typical IoT-enabled network smart sensors are geographically distributed to collect and process data within smart infrastructure using an open channel, the Internet. However, the use of the Internet brings inherent ...
Read More
With the advancement of low cost and low energy consuming sensors, Internet of Things (IoT) is building a network of Internet-enabled devices. The concept of IoT is employed in almost all fields such as healthcare, smart-cities, smart-grids, energy distribution, agriculture, and even transportation. In a typical IoT-enabled network smart sensors are geographically distributed to collect and process data within smart infrastructure using an open channel, the Internet. However, the use of the Internet brings inherent vulnerabilities related to security (e.g., IoT devices can be compromised using advanced hacking techniques) and privacy (e.g., adversary performing inference and data poisoning attacks). Intrusion Detection System (IDS) and Cyber Threat Intelligence (CTI) are the two most extensively used techniques in IoT-enabled network to safeguard the integrity and availability of sensitive smart systems. However, the presence of large volume of data i.e., dimensionality curse and cloud-based centralized deployment mechanism has adverse effect on the IDS performance in terms of intrusion detection task and increased latency for data processing. On the other hand, modeling CTI is challenging due to the limited labels of cyber threat sources, and analysing these sources to extract relevant threat information manually is time consuming and error-prone procedure that necessitates a large investment of resources.
Read Less