Detecting Zero-day Attack with Federated Learning using Autonomously Extracted Anomalies in IoT

被引:1
作者
Ohtani, Takahiro [1 ]
Yamamoto, Ryo [1 ]
Ohzahata, Satoshi [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
来源
2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2024年
关键词
IoT; Network; Security; Intrusion detection; Zero-day attacks; Federated learning; Machine learning;
D O I
10.1109/CCNC51664.2024.10454669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has become an essential element of our daily lives. However, IoT devices used in IoT environments have limited available resources due to power and cost constraints, and this fact makes it difficult to implement advanced security measures on them. In fact, zero-day attacks targeting vulnerable IoT devices have occurred, and introducing an anomaly-based intrusion detection system (IDS) that can detect zero-day attacks is one of the countermeasures against the attacks. However, existing methods still suffer from limited detection ability due to a lack of training data. To solve this problem, this paper proposes an intrusion detection method that aggregates zero-day and false positive (FP) attack candidates extracted by an unsupervised anomaly detection algorithm using a one-class classification algorithm and FL. The detection performance evaluation confirms that the proposed method can share the autonomously detected zero-day attacks among IoT networks while suppressing FPs generated during the candidate extraction process.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 11 条
  • [1] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [2] [Anonymous], 2023, new jersey cybersecurity & communications integration cell
  • [3] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [4] Beutel DJ, 2022, Arxiv, DOI [arXiv:2007.14390, DOI 10.48550/ARXIV.2007.14390]
  • [5] McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
  • [6] N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair
    Bohadana, Michael
    Mathov, Yael
    Mirsky, Yisroel
    Shabtai, Asaf
    Breitenbacher, Dominik
    Elovici, Yuval
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 12 - 22
  • [7] Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices
    Popoola, Segun, I
    Ande, Ruth
    Adebisi, Bamidele
    Gui, Guan
    Hammoudeh, Mohammad
    Jogunola, Olamide
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3930 - 3944
  • [8] Rahimi A, 2007, ADV NEURAL INFORM PR, V21, P1177
  • [9] Estimating the support of a high-dimensional distribution
    Schölkopf, B
    Platt, JC
    Shawe-Taylor, J
    Smola, AJ
    Williamson, RC
    [J]. NEURAL COMPUTATION, 2001, 13 (07) : 1443 - 1471
  • [10] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592