Raspberry Pi-based Intelligent Cyber Defense Systems for SMEs and Smart-homes: An Exploratory Study

Authors

  • Sreenivas Sremath Tirumala Manukau Institute of Technology image/svg+xml
  • Narayan Nepal Yoobee Colleges, Christchurch
  • Sayan Kumar Ray Manukau Institute of Technology image/svg+xml

DOI:

https://doi.org/10.4108/eetsc.v6i18.2345

Keywords:

Cyber defense, Raspberry-Pi, intelligent cyber-defense system

Abstract

Ongoing ransomware attacks have forced business to think about security of their resources. Recently, small- to-medium enterprises (SMEs) and Smart-homes have become easy targets for attackers since they don’t have cyber defense mechanism in place other than simple firewall systems which are quite vulnerable. Cyber defense systems are costly and often not within the budget of SMEs or families which inspired to think about low cost yet highly efficient cyber defense solutions. Regular individuals and families who use internet for day to day use often end-up becoming a possible resource for using them as Trojan or bitcoin nodes. This research explores the prospects of implementing a Raspberry Pi (Raspberry Pi)-based intelligent cyber- defense system (iCDS) for SME networks and Smart-homes to filter malicious contents from incoming traffic and detect malware using artificial intelligence.

Primarily, the work presented in this paper tries to evaluate the hardware capability of network interfaces (both internal, and attached) of Raspberry Pi for handle high volumes of incoming traffic. For this, we measure the network performance of the Raspberry Pi using the speed test software and try to explore the possibility of a light weight machine learning (ML) based malware detection. The results show that the built in Ethernet interface outperforms the built in WiFi and external attached USB to Ethernet Adapter in terms of latency, download and upload throughput. Also, a new DNA based ML approach was successfully able to produce over 19.5% better accuracy rates of over classifier trained with hash-sequence. The experiment results further emphasise on the importance of generating complex malware signatures with variety to face existing threats which has taken a new form due to increase in malware based attacks, particularly for ransomware. The complexity of the generated malware is based on generic yet strong encryption principles which produced good results which is quite encouraging at this stage.

Downloads

Download data is not yet available.

References

Belanger, F., Hiller, J.S. and Smith, W.J. (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The journal of strategic Information Systems 11(3-4): 245–270. DOI: https://doi.org/10.1016/S0963-8687(02)00018-5

Lu, Z., Qu, G. and Liu, Z. (2018) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems 20(2): 760–776. DOI: https://doi.org/10.1109/TITS.2018.2818888

Tirumala, S.S., Sathu, H. and Naidu, V. (2015) Analysis and prevention of account hijacking based incidents in cloud environment. In 2015 international Conference on Information Technology (ICIT) (IEEE): 124–129. DOI: https://doi.org/10.1109/ICIT.2015.29

Alnahari, W. and Quasim, M.T. (2021) Privacy concerns, iot devices and attacks in smart cities. In 2021 International Congress of Advanced Technology and Engineering (ICOTEN) (IEEE): 1–5. DOI: https://doi.org/10.1109/ICOTEN52080.2021.9493559

Khraisat, A., Gondal, I., Vamplew, P. and Kamruzza- man, J. (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1): 1–22. DOI: https://doi.org/10.1186/s42400-019-0038-7

Ali, B. and Awad, A.I. (2018) Cyber and physical security vulnerability assessment for iot-based smart homes. sensors 18(3): 817. DOI: https://doi.org/10.3390/s18030817

Granjal, J., Monteiro, E. and Silva, J.S. (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17(3): 1294–1312. DOI: https://doi.org/10.1109/COMST.2015.2388550

Aslan, Ö.A. and Samet, R. (2020) A comprehensive review on malware detection approaches. IEEE Access 8: 6249–6271. DOI: https://doi.org/10.1109/ACCESS.2019.2963724

Jin, B., Choi, J., Kim, H. and Hong, J.B. (2021) Fumvar: a practical framework for generating f ully-working and u nseen m alware var iants. In Proceedings of the 36th Annual ACM Symposium on Applied Computing: 1656– 1663. DOI: https://doi.org/10.1145/3412841.3442039

James, A.V. and Sabitha, S. (2021) Malware attacks: A survey on mitigation measures. In Second International Conference on Networks and Advances in Computational Technologies (Springer): 1–11. DOI: https://doi.org/10.1007/978-3-030-49500-8_1

Scott, J. (2017) Signature based malware detection is dead. Institute for Critical Infrastructure Technology .

Tirumala, S.S., Valluri, M.R. and Nanadigam, D. (2020) Evaluation of feature and signature based training approaches for malware classification using autoencoders. In 2020 International Conference on COMmunication Systems NETworkS (COMSNETS): 1–5. doi:10.1109/COMSNETS48256.2020.9027373.

Usman, N., Usman, S., Khan, F., Jan, M.A., Sajid, A., Alazab, M. and Watters, P. (2021) Intelligent dynamic malware detection using machine learning in ip reputation for forensics data analytics. Future Generation Computer Systems 118: 124–141. DOI: https://doi.org/10.1016/j.future.2021.01.004

Choi, Y.H., Han, B.J., Bae, B.C., Oh, H.G. and Sohn,

K.W. (2012) Toward extracting malware features for classification using static and dynamic analysis. In 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC) (IEEE): 126–129.

Tirumala, S.S., Valluri, M.R. and Nanadigam, D. (2020) Evaluation of feature and signature based training approaches for malware classification using autoencoders. In 2020 International Conference on COMmunication Systems NETworkS (COMSNETS): 1–5. doi:10.1109/COMSNETS48256.2020.9027373. DOI: https://doi.org/10.1109/COMSNETS48256.2020.9027373

Minoli, D. (2017) Iot applications to smart campuses and a case study. EAI Endorsed Transactions on Smart Cities 2(5): e4–e4. DOI: https://doi.org/10.4108/eai.19-12-2017.153483

Banga, M., Patil, M. et al. (2020) Secured authentication systems for internet of things. EAI Endorsed Transactions on Smart Cities 20(11).

Kolias, C., Kambourakis, G., Stavrou, A. and Voas, J. (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7): 80–84. DOI: https://doi.org/10.1109/MC.2017.201

Lu, D., Huang, D., Walenstein, A. and Medhi, D. (2017) A secure microservice framework for iot. In 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE) (IEEE): 9–18. DOI: https://doi.org/10.1109/SOSE.2017.27

Pahl, M.O., Aubet, F.X. and Liebald, S. (2018) Graph- based iot microservice security. In NOMS 2018- 2018 IEEE/IFIP Network Operations and Management Symposium (IEEE): 1–3. DOI: https://doi.org/10.1109/NOMS.2018.8406118

Gupta, N., Naik, V. and Sengupta, S. (2017) A firewall for internet of things. In 2017 9th International Conference on Communication Systems and Networks (COMSNETS) (IEEE): 411–412. DOI: https://doi.org/10.1109/COMSNETS.2017.7945418

Taib, A.M., Zabri, M.T., Radzi, N.A.M. and Kadir, E.A. (2020) Netguard: Securing network environment using integrated openvpn, pi-hole, and ids on raspberry pi. In Charting the Sustainable Future of ASEAN in Science and Technology (Springer), 97–110. DOI: https://doi.org/10.1007/978-981-15-3434-8_9

Jesús, R.L.J., Cristhian, P.V.O., René, R.G.M. and Heberto, F.M. (2019) How to improve the iot security implementing ids/ips tool using raspberry pi 3b. Editorial Preface From the Desk of Managing Editor. . . 10(9). DOI: https://doi.org/10.14569/IJACSA.2019.0100952

Tripathi, S. and Kumar, R. (2018) Raspberry pi as an intrusion detection system, a honeypot and a packet analyzer. In 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS) (IEEE): 80–85. DOI: https://doi.org/10.1109/CTEMS.2018.8769135

Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R. and Sakurai, K. (2019) Implementing lightweight iot- ids on raspberry pi using correlation-based feature selection and its performance evaluation. In International Conference on Advanced Information Networking and Applications (Springer): 458–469. DOI: https://doi.org/10.1007/978-3-030-15032-7_39

Sumanth, R. and Bhanu, K. (2020) Raspberry pi based intrusion detection system using k-means clustering algorithm. In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) (IEEE): 221–229. DOI: https://doi.org/10.1109/ICIRCA48905.2020.9183177

Malikovich, K.M., Rajaboevich, G.S. and Karama- tovich, Y.B. (2019) Method of constucting packet filter- ing rules. In 2019 International Conference on Informa- tion Science and Communications Technologies (ICISCT) (IEEE): 1–4. DOI: https://doi.org/10.1109/ICISCT47635.2019.9011933

Meng, W., Li, W. and Kwok, L.F. (2017) Towards effective trust-based packet filtering in collaborative network environments. IEEE Transactions on Network and Service Management 14(1): 233–245. DOI: https://doi.org/10.1109/TNSM.2017.2664893

Serdechnyi, V., Barkovska, O., Rosinskiy, D., Axak,

N. and Korablyov, M. (2019) Model of the internet traffic filtering system to ensure safe web surfing. In International Scientific Conference “Intellectual Systems of Decision Making and Problem of Computational Intelligence” (Springer): 133–147. DOI: https://doi.org/10.1007/978-3-030-26474-1_10

Yu, B., Fang, Y., Yang, Q., Tang, Y. and Liu, L. (2018) A survey of malware behavior description and analysis. Frontiers of Information Technology & Electronic Engineering 19(5): 583–603. DOI: https://doi.org/10.1631/FITEE.1601745

Bulygin, M. and Namiot, D. (2021) Anomaly detection method for aggregated cellular operator data. In 2021 28th Conference of Open Innovations Association (FRUCT) (IEEE): 42–48. DOI: https://doi.org/10.23919/FRUCT50888.2021.9347606

Pang, G., Shen, C., Cao, L. and Hengel, A.V.D. (2021) Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR) 54(2): 1–38. DOI: https://doi.org/10.1145/3439950

Sihwail, R., Omar, K. and Ariffin, K.A.Z. (2018) A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis. International Journal on Advanced Science, Engineering and Information Technology 8(4-2): 1662. DOI: https://doi.org/10.18517/ijaseit.8.4-2.6827

Ijaz, M., Durad, M.H. and Ismail, M. (2019) Static and dynamic malware analysis using machine learning. In 2019 16th International bhurban conference on applied sciences and technology (IBCAST) (IEEE): 687–691. DOI: https://doi.org/10.1109/IBCAST.2019.8667136

Ding, J., Chen, Z., Zhao, Y., Su, H., Guo, Y. and Sun, E. (2017) Mget: malware gene-based malware dynamic analyses. In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy: 96–101. DOI: https://doi.org/10.1145/3058060.3058065

Naidu, V.J. (2018) Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques. Ph.D. thesis, Auckland University of Technology.

Siddiqui, M., Wang, M.C. and Lee, J. (2008) A survey of data mining techniques for malware detection using file features. In Proceedings of the 46th annual southeast regional conference on xx: 509–510. DOI: https://doi.org/10.1145/1593105.1593239

Jang, E.G., Lee, S.J. and Lee, J.I. (2014) A study on similarity comparison for file dna-based metamorphic malware detection. Journal of the Korea Society of Computer and Information 19(1): 85–94. DOI: https://doi.org/10.9708/jksci.2014.19.1.085

Chen, L., Xia, C., Lei, S. and Wang, T. (2021) Detection, traceability, and propagation of mobile malware threats. IEEE Access 9: 14576–14598. DOI: https://doi.org/10.1109/ACCESS.2021.3049819

Karbab, E.B., Debbabi, M. and Mouheb, D. (2016) Fingerprinting android packaging: Generating dnas for malware detection. Digital Investigation 18: S33–S45. DOI: https://doi.org/10.1016/j.diin.2016.04.013

Han, B.J., Choi, Y.H. and Bae, B.C. (2013) Generating malware dna to classify the similar malwares. Journal of the Korea Institute of Information Security & Cryptology 23(4): 679–694. DOI: https://doi.org/10.13089/JKIISC.2013.23.4.679

Tirumala, S.S., Nepal, N. and Ray, S.K. (2022) Raspberry pi-based intelligent cyber defense systems for smes: An exploratory study. In International Summit Smart City 360° (Springer): 3–14. DOI: https://doi.org/10.1007/978-3-031-06371-8_1

Tirumala, S., Jamil, N. and Malik, M.A. (2018) A deep neural network approach for classification of watermarked and non-watermarked images. In International Conference on Intelligent Technologies and Applications (Springer): 779–784. DOI: https://doi.org/10.1007/978-981-13-6052-7_67

Downloads

Published

03-08-2022

How to Cite

[1]
S. S. Tirumala, N. Nepal, and S. K. Ray, “Raspberry Pi-based Intelligent Cyber Defense Systems for SMEs and Smart-homes: An Exploratory Study”, EAI Endorsed Trans Smart Cities, vol. 6, no. 18, p. e4, Aug. 2022.