Toward Improving the Security of IoT and CPS Devices: An AI Approach

被引:5
作者
Albasir, Abdurhman [1 ]
Naik, Kshirasagar [1 ]
Manzano, Ricardo [1 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L3G1, Canada
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2023年 / 4卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Dependability of IoT and CPS devices; power signature; signal processing; cybersecurity; anomalous behavior detection; machine learning; attacks; failures; MALWARE; CHALLENGES; RESILIENCE; NETWORKS;
D O I
10.1145/3497862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This article presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device's one-dimensional (1D) instantaneous power consumption signals to 2D time-frequency images using Constant Q Transformation (CQT). The CQT images capture valuable information about the tasks performed on-board a device. By applying Histograms of Oriented Gradients (HOG) on the CQT images, we extract robust features that preserve the edges of time-frequency structures and capture the directionality of the edge information. Consequently, we transform the anomaly detection problem into an image classification problem. We train a Convolutional Neural Network on the HOG images to classify the power signals to detect anomaly. We validated the methodology using a wide spectrum of emulated malware scenarios, five real malware applications from the well-known Drebin dataset, Distributed Denial of Service attacks, cryptomining malware, and faulty CPU cores. Across 18 datasets, our methodology demonstrated detection performance of similar to 88% accuracy and 85% F-Score, resulting in improvements of 9-17% over other methods using power signals.
引用
收藏
页数:30
相关论文
共 88 条
[1]  
Albasir A, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P2032, DOI 10.1109/ICASSP.2018.8461304
[2]   Cyber security challenges and solutions for V2X communications: A survey [J].
Alnasser, Aljawharah ;
Sun, Hongjian ;
Jian, Jing .
COMPUTER NETWORKS, 2019, 151 :52-67
[3]  
[Anonymous], Monsoon power monitor
[4]  
Antonini A., 2014, P 2 INT S ICS SCADA
[5]   Using Behavioral Profiles to Detect Software Flaws in Network Servers [J].
Antunes, Joao ;
Neves, Nuno Ferreira .
22ND IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2011, :1-10
[6]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[7]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[8]   The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances [J].
Bagnall, Anthony ;
Lines, Jason ;
Bostrom, Aaron ;
Large, James ;
Keogh, Eamonn .
DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 31 (03) :606-660
[9]   Cyber Resilience in IoT network: Methodology and example of assessment through epidemic spreading approach [J].
Bellini, Emanuele ;
Bagnoli, Franco ;
Ganin, Alexander A. ;
Linkov, Igor .
2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, :72-77
[10]  
Bensaoud A, 2020, Arxiv, DOI arXiv:2010.16108