SlideShare a Scribd company logo
1 of 2
Download to read offline
DLTIF: Deep Learning
Threat Intelligence Modeling and
Identification Framework in IoT
Maritime Transportation Systems
Abstract
The recent burgeoning of Internet of Things (IoT) technologies in the maritime
industry is successfully digitalizing Maritime Transportation Systems (MTS). In
IoT-enabled MTS, the smart maritime objects, infrastructure associated with
ship or port communicate wirelessly using an open channel Internet. The
intercommunication and incorporation of heterogeneous technologies in IoT
enabled MTS brings opportunities not only for the industries that embrace it,
but also for cyber-criminals. Cyber Threat Intelligen
security strategy that uses artificial intelligence models to understand cyber
attacks and can protect data of IoT
most of the existing CTI-
relevant threat information, and has low detection and high false alarm rate.
DLTIF: Deep Learning-Driven Cyber
Threat Intelligence Modeling and
Identification Framework in IoT-Enabled
Maritime Transportation Systems
The recent burgeoning of Internet of Things (IoT) technologies in the maritime
industry is successfully digitalizing Maritime Transportation Systems (MTS). In
enabled MTS, the smart maritime objects, infrastructure associated with
ate wirelessly using an open channel Internet. The
intercommunication and incorporation of heterogeneous technologies in IoT
enabled MTS brings opportunities not only for the industries that embrace it,
criminals. Cyber Threat Intelligence (CTI) is an effective
security strategy that uses artificial intelligence models to understand cyber
attacks and can protect data of IoT-enabled MTS proficiently. Unsurprisingly,
-based solutions uses manual analysis to extract
elevant threat information, and has low detection and high false alarm rate.
Driven Cyber
Threat Intelligence Modeling and
Enabled
Maritime Transportation Systems
The recent burgeoning of Internet of Things (IoT) technologies in the maritime
industry is successfully digitalizing Maritime Transportation Systems (MTS). In
enabled MTS, the smart maritime objects, infrastructure associated with
ate wirelessly using an open channel Internet. The
intercommunication and incorporation of heterogeneous technologies in IoT-
enabled MTS brings opportunities not only for the industries that embrace it,
ce (CTI) is an effective
security strategy that uses artificial intelligence models to understand cyber-
enabled MTS proficiently. Unsurprisingly,
based solutions uses manual analysis to extract
elevant threat information, and has low detection and high false alarm rate.
Therefore, to tackle aforementioned challenges, an automated framework
called DLTIF is developed for modeling cyber threat intelligence and
identifying threat types. The proposed DLTIF is based on three schemes: a
deep feature extractor (DFE), CTI-driven detection (CTIDD) and CTI-attack
type identification (CTIATI). The DFE scheme automatically extracts the
hidden patterns of IoT-enabled MTS network and its output is used by CTIDD
scheme for threat detection. The CTIATI scheme is designed to identify the
exact threat types and to assist security analysts in giving early warning and
adopt defensive strategies. The proposed framework has obtained upto 99%
accuracy, and outperforms some traditional and recent state-of-the-art
approaches.

More Related Content

Similar to DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems.pdf

Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
edgar6wallace88877
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 

Similar to DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems.pdf (20)

IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
IoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITSIoT applications for connected vehicle and ITS
IoT applications for connected vehicle and ITS
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
Cameras Everywhere_ The Latest Craze.pdf
Cameras Everywhere_ The Latest Craze.pdfCameras Everywhere_ The Latest Craze.pdf
Cameras Everywhere_ The Latest Craze.pdf
 
Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
 
journal for research
journal for researchjournal for research
journal for research
 
Internet of Robotic Things
Internet of Robotic ThingsInternet of Robotic Things
Internet of Robotic Things
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?
 
White paper openmtc
White paper openmtcWhite paper openmtc
White paper openmtc
 
How Internet of Things Start Businesses Transformation
How Internet of Things Start Businesses TransformationHow Internet of Things Start Businesses Transformation
How Internet of Things Start Businesses Transformation
 
IoTConcept&Architecture.grt kerning gud to seeppt
IoTConcept&Architecture.grt kerning gud to seepptIoTConcept&Architecture.grt kerning gud to seeppt
IoTConcept&Architecture.grt kerning gud to seeppt
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 

More from OKOKPROJECTS

More from OKOKPROJECTS (20)

Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
Distributed State Estimation With Deep Neural Networks for Uncertain Nonlinea...
 
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
Distributed Inference in Resource-Constrained IoT for Real-Time Video Surveil...
 
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
DGSSC A Deep Generative Spectral-Spatial Classifier for Imbalanced Hyperspect...
 
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdfDigital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
Digital Restoration of Cultural Heritage With Data-Driven Computing A Survey.pdf
 
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
 
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
DendroMap Visual Exploration of Large-Scale Image Datasets for Machine Learni...
 
Dense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdfDense Nested Attention Network for Infrared Small Target Detection.pdf
Dense Nested Attention Network for Infrared Small Target Detection.pdf
 
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdfDetection of Small Moving Targets in Cluttered Infrared Imagery.pdf
Detection of Small Moving Targets in Cluttered Infrared Imagery.pdf
 
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdfDepression Screening in Humans With AI and Deep Learning Techniques.pdf
Depression Screening in Humans With AI and Deep Learning Techniques.pdf
 
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdfDeepTx Deep Learning Beamforming With Channel Prediction.pdf
DeepTx Deep Learning Beamforming With Channel Prediction.pdf
 
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
DeHIN A Decentralized Framework for Embedding Large-Scale Heterogeneous Infor...
 
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
 
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
Deep-Learning-Driven Proactive Maintenance Management of IoT-Empowered Smart ...
 
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks...
 
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
DeepCog A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework i...
 
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
DeepCrowd A Deep Model for Large-Scale Citywide Crowd Density and Flow Predic...
 
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdfD2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
D2Net Deep Denoising Network in Frequency Domain for Hyperspectral Image.pdf
 
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
Decentralized Federated Learning for Industrial IoT With Deep Echo State Netw...
 
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdfCyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
 
CSKG4APT A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organ...
CSKG4APT A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organ...CSKG4APT A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organ...
CSKG4APT A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organ...
 

Recently uploaded

Recently uploaded (20)

An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 

DLTIF Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems.pdf

  • 1. DLTIF: Deep Learning Threat Intelligence Modeling and Identification Framework in IoT Maritime Transportation Systems Abstract The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of heterogeneous technologies in IoT enabled MTS brings opportunities not only for the industries that embrace it, but also for cyber-criminals. Cyber Threat Intelligen security strategy that uses artificial intelligence models to understand cyber attacks and can protect data of IoT most of the existing CTI- relevant threat information, and has low detection and high false alarm rate. DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In enabled MTS, the smart maritime objects, infrastructure associated with ate wirelessly using an open channel Internet. The intercommunication and incorporation of heterogeneous technologies in IoT enabled MTS brings opportunities not only for the industries that embrace it, criminals. Cyber Threat Intelligence (CTI) is an effective security strategy that uses artificial intelligence models to understand cyber attacks and can protect data of IoT-enabled MTS proficiently. Unsurprisingly, -based solutions uses manual analysis to extract elevant threat information, and has low detection and high false alarm rate. Driven Cyber Threat Intelligence Modeling and Enabled Maritime Transportation Systems The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In enabled MTS, the smart maritime objects, infrastructure associated with ate wirelessly using an open channel Internet. The intercommunication and incorporation of heterogeneous technologies in IoT- enabled MTS brings opportunities not only for the industries that embrace it, ce (CTI) is an effective security strategy that uses artificial intelligence models to understand cyber- enabled MTS proficiently. Unsurprisingly, based solutions uses manual analysis to extract elevant threat information, and has low detection and high false alarm rate.
  • 2. Therefore, to tackle aforementioned challenges, an automated framework called DLTIF is developed for modeling cyber threat intelligence and identifying threat types. The proposed DLTIF is based on three schemes: a deep feature extractor (DFE), CTI-driven detection (CTIDD) and CTI-attack type identification (CTIATI). The DFE scheme automatically extracts the hidden patterns of IoT-enabled MTS network and its output is used by CTIDD scheme for threat detection. The CTIATI scheme is designed to identify the exact threat types and to assist security analysts in giving early warning and adopt defensive strategies. The proposed framework has obtained upto 99% accuracy, and outperforms some traditional and recent state-of-the-art approaches.