Toward Improving the Security of IoT and CPS Devices: An AI Approach

被引:5
作者
Albasir, Abdurhman [1 ]
Naik, Kshirasagar [1 ]
Manzano, Ricardo [1 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L3G1, Canada
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2023年 / 4卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Dependability of IoT and CPS devices; power signature; signal processing; cybersecurity; anomalous behavior detection; machine learning; attacks; failures; MALWARE; CHALLENGES; RESILIENCE; NETWORKS;
D O I
10.1145/3497862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This article presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device's one-dimensional (1D) instantaneous power consumption signals to 2D time-frequency images using Constant Q Transformation (CQT). The CQT images capture valuable information about the tasks performed on-board a device. By applying Histograms of Oriented Gradients (HOG) on the CQT images, we extract robust features that preserve the edges of time-frequency structures and capture the directionality of the edge information. Consequently, we transform the anomaly detection problem into an image classification problem. We train a Convolutional Neural Network on the HOG images to classify the power signals to detect anomaly. We validated the methodology using a wide spectrum of emulated malware scenarios, five real malware applications from the well-known Drebin dataset, Distributed Denial of Service attacks, cryptomining malware, and faulty CPU cores. Across 18 datasets, our methodology demonstrated detection performance of similar to 88% accuracy and 85% F-Score, resulting in improvements of 9-17% over other methods using power signals.
引用
收藏
页数:30
相关论文
共 88 条
[31]   Malware Analysis Using Visualized Image Matrices [J].
Han, KyoungSoo ;
Kang, BooJoong ;
Im, Eul Gyu .
SCIENTIFIC WORLD JOURNAL, 2014,
[32]  
Hilton S., 2016, DYN ANAL SUMMARY FRI
[33]  
Hoffmann J., 2013, INT WORKSH REC ADV I
[34]  
Hoh B, 2006, IEEE PERVAS COMPUT, V5, P38, DOI 10.1109/MPRV.2006.69
[35]  
Horsch J., 2019, Dissertation
[36]  
Hung M., 2017, Leading the IoT - Gartner
[37]  
Huzaifah M, 2017, Arxiv, DOI arXiv:1706.07156
[38]  
Fawaz HI, 2019, Arxiv, DOI arXiv:1809.04356
[39]  
James M., 2015, Technical Report
[40]   Detection of Anomalous Behavior of Smartphones Using Signal Processing and Machine Learning Techniques [J].
James, R. Soundar Raja ;
Albasir, A. ;
Naik, K. ;
Dabbagh, M. Y. ;
Dash, P. ;
Zaman, M. ;
Goel, N. .
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,