Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification

被引:4
作者
Danso, Priscilla Kyei [1 ]
Dadkhah, Sajjad [1 ]
Neto, Euclides Carlos Pinto
Zohourian, Alireza [1 ]
Molyneaux, Heather [2 ]
Lu, Rongxing [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Canadian Inst Cybersecur, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[2] Digital Technol Res Ctr, Natl Res Council, Cybersecur Team, Fredericton, NB E3B 9W4, Canada
关键词
Internet of Things (IoT); machine learning (ML); security; transferability; visualization; vulnerability assessment;
D O I
10.1109/JIOT.2023.3292319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of appropriate cyber security measures deployed on Internet of Things (IoT) makes these devices prone to security issues. Consequently, the timely identification and detection of these compromised devices become crucial. Machine learning (ML) models which are used to monitor devices in a network have made tremendous strides. However, most of the research in profiling and identification uses the same data for training and testing. Hence, a slight change in the data renders most learning algorithms to work poorly. In this article, we study a transferability approach based on the concept of transductive transfer learning for IoT device profiling and identification. Notably, this type of transfer learning works by explicitly assigning labels to the test data in the target domain by using the test feature space in the target domain, with training data from the source domain. Specifically, we propose a three-component system comprising: 1) the device type identification; 2) the vulnerability assessment; and 3) the visualization module. The device type identification component uses the underlying concept of transductive transfer learning where the trained model is transferred to a remote lab for testing. A variety of ML models are evaluated with respect to accuracy, precision, recall, and F1-score in order to determine which are the most suitable for the proposed transferability profiling. Furthermore, the vulnerability of the predicted device type is also assessed by using three vulnerability databases: 1) Vulners; 2) National Vulnerability Database (NVD); and 3) IBM X-Force. Finally, the results from the vulnerability assessment are visualized and displayed on a dashboard.
引用
收藏
页码:2322 / 2335
页数:14
相关论文
共 41 条
  • [41] Zhuang FZ, 2020, Arxiv, DOI arXiv:1911.02685