Toward Improving the Security of IoT and CPS Devices: An AI Approach

被引:5
作者
Albasir, Abdurhman [1 ]
Naik, Kshirasagar [1 ]
Manzano, Ricardo [1 ]
机构
[1] Univ Waterloo, 200 Univ Ave, Waterloo, ON N2L3G1, Canada
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2023年 / 4卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Dependability of IoT and CPS devices; power signature; signal processing; cybersecurity; anomalous behavior detection; machine learning; attacks; failures; MALWARE; CHALLENGES; RESILIENCE; NETWORKS;
D O I
10.1145/3497862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This article presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device's one-dimensional (1D) instantaneous power consumption signals to 2D time-frequency images using Constant Q Transformation (CQT). The CQT images capture valuable information about the tasks performed on-board a device. By applying Histograms of Oriented Gradients (HOG) on the CQT images, we extract robust features that preserve the edges of time-frequency structures and capture the directionality of the edge information. Consequently, we transform the anomaly detection problem into an image classification problem. We train a Convolutional Neural Network on the HOG images to classify the power signals to detect anomaly. We validated the methodology using a wide spectrum of emulated malware scenarios, five real malware applications from the well-known Drebin dataset, Distributed Denial of Service attacks, cryptomining malware, and faulty CPU cores. Across 18 datasets, our methodology demonstrated detection performance of similar to 88% accuracy and 85% F-Score, resulting in improvements of 9-17% over other methods using power signals.
引用
收藏
页数:30
相关论文
共 88 条
[51]  
Linkov I, 2019, RISK SYST DECIS, P1, DOI 10.1007/978-3-319-77492-3_1
[52]   On Code Execution Tracking via Power Side-Channel [J].
Liu, Yannan ;
Wei, Lingxiao ;
Zhou, Zhe ;
Zhang, Kehuan ;
Xu, Wenyuan ;
Xu, Qiang .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1019-1031
[53]  
Martin ED, 2019, PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), P161, DOI [10.1109/dessert.2019.8770027, 10.1109/DESSERT.2019.8770027]
[54]   Applying Petri Nets to Modeling of Many-Core Processor Self-Testing when Tests are Performed Randomly [J].
Mashkov, Viktor ;
Barilla, Jiri ;
Simr, Pavel .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2013, 29 (01) :25-34
[55]  
Meng D., 2011, ZTE Technol. J., V1, P1
[56]   A Friend or a Foe? Detecting Malware using Memory and CPU Features [J].
Milosevic, Jelena ;
Malek, Miroslaw ;
Ferrante, Alberto .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :73-84
[57]  
Mukhija A., 2007, Ph.D. Dissertation
[58]  
Nataraj L., 2011, Proceedings of Visualization for Cyber Security, P1, DOI DOI 10.1145/2016904.2016908
[59]   EDDIE: EM-Based Detection of Deviations in Program Execution [J].
Nazari, Alireza ;
Sehatbakhsh, Nader ;
Alam, Monjur ;
Zajic, Alenka ;
Prvulovic, Milos .
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), 2017, :333-346
[60]   Malware identification using visualization images and deep learning [J].
Ni, Sang ;
Qian, Quan ;
Zhang, Rui .
COMPUTERS & SECURITY, 2018, 77 :871-885