Effective Anomaly Detection Using Deep Learning in IoT Systems

被引:15
作者
Aversano L. [1 ]
Bernardi M.L. [1 ]
Cimitile M. [2 ]
Pecori R. [1 ]
Veltri L. [3 ]
机构
[1] University of Sannio, BN, Benevento
[2] Unitelma Sapienza University, RM, Rome
[3] University of Parma, PR, Parma
关键词
40;
D O I
10.1155/2021/9054336
中图分类号
学科分类号
摘要
Anomaly detection in network traffic is a hot and ongoing research theme especially when concerning IoT devices, which are quickly spreading throughout various situations of people's life and, at the same time, prone to be attacked through different weak points. In this paper, we tackle the emerging anomaly detection problem in IoT, by integrating five different datasets of abnormal IoT traffic and evaluating them with a deep learning approach capable of identifying both normal and malicious IoT traffic as well as different types of anomalies. The large integrated dataset is aimed at providing a realistic and still missing benchmark for IoT normal and abnormal traffic, with data coming from different IoT scenarios. Moreover, the deep learning approach has been enriched through a proper hyperparameter optimization phase, a feature reduction phase by using an autoencoder neural network, and a study of the robustness of the best considered deep neural networks in situations affected by Gaussian noise over some of the considered features. The obtained results demonstrate the effectiveness of the created IoT dataset for anomaly detection using deep learning techniques, also in a noisy scenario. © 2021 Lerina Aversano et al.
引用
收藏
相关论文
共 40 条
[1]  
Tahaei H., Afifi F., Asemi A., Zaki F., Anuar N.B., The rise of traffic classification in IoT networks: A survey, Journal of Network and Computer Applications, 154, (2020)
[2]  
Acampora G., Bernardi M.L., Cimitile M., Tortora G., Vitiello A., A Fuzzy Clustering-based Approach to Study Malware Phylogeny
[3]  
Bernardi M., Cimitile M., Martinelli F., Mercaldo F., Keystroke Analysis for User Identification Using Deep Neural Networks
[4]  
Bernardi M.L., Cimitile M., Distante D., Martinelli F., Mercaldo F., Dynamic malware detection and phylogeny analysis using process mining, International Journal of Information Security, 18, 3, pp. 257-284, (2019)
[5]  
Perrone G., Vecchio M., Pecori R., Giaffreda R., The Day after Mirai: A Survey on MQTT Security Solutions after the Largest Cyber-attack Carried out through An Army of IoT Devices, pp. 246-253
[6]  
Bernardi M.L., Cimitile M., Martinelli F., Mercaldo F., Game Bot Detection in Online Role Player Game through Behavioural Features, pp. 50-60
[7]  
Calabretta M., Pecori R., Veltri L., A Token-based Protocol for Securing MQTT Communications
[8]  
Pecori R., Tayebi A., Vannucci A., Veltri L., Iot Attack Detection with Deep Learning Analysis
[9]  
Aversano L., Bernardi M.L., Cimitile M., Pecori R., A systematic review on deep learning approaches for IoT security, Computer Science Review, (2021)
[10]  
Balin M.F., Abid A., Zou J., Chaudhuri K., Salakhutdinov R., Concrete autoencoders: Differentiable feature selection and reconstruction, Proceedings of the 36th International Conference on Machine Learning, pp. 444-453, (2019)