IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security

被引:4
作者
Messai, Mohamed-Lamine [1 ]
Seba, Hamida [2 ]
机构
[1] Univ Lyon 2, Univ Lyon, UR ERIC, Bron, France
[2] Univ Lyon, UCBL, CNRS, INSA Lyon,LIRIS,UMR5205, Villeurbanne, France
来源
18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023 | 2023年
关键词
Internet of Things; attack detection; activity graphs; graph learning; INTRUSION DETECTION; SMOTE;
D O I
10.1145/3600160.3605053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, IoT networks offer large attack surface. There are many potential entry points for cybercriminals in these networks. Hence, attack detection is an essential part of securing IoT networks and protecting them against the potential harm or damage that can result from successful attacks. In this paper, we propose a graph-based framework for detecting attacks in IoT networks. Our approach involves constructing an activity graph to represent the networking events occurring during a moni-toring window. This graph is a rich attributed graph capturing both structure and semantic features from the network traffc. Then, we train a neural network on this graph to distinguish between normal activities and attacks. Our preliminary experiments show that our approach is able to accurately detect a large range of attacks when the size of the monitoring window is correctly set.
引用
收藏
页数:14
相关论文
共 27 条
[1]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[2]  
[Anonymous], 2012, KDD, DOI DOI 10.1145/2339530.2339667
[3]  
Bhatia Siddharth, 2022, ACM T KNOWL DISCOV D, V16, DOI [10.1145/3494564, DOI 10.1145/3494564]
[4]   A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications [J].
Cai, HongYun ;
Zheng, Vincent W. ;
Chang, Kevin Chen-Chuan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (09) :1616-1637
[5]   GRANEF: Utilization of a Graph Database for Network Forensics [J].
Cermak, Milan ;
Sramkova, Denisa .
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, :785-790
[6]   F-FADE: Frequency Factorization for Anomaly Detection in Edge Streams [J].
Chang, Yen-Yu ;
Li, Pan ;
Sosic, Rok ;
Afifi, M. H. ;
Schweighauser, Marco ;
Leskovec, Jure .
WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2021, :589-597
[7]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[8]   A Survey on Big Data for Network Traffic Monitoring and Analysis [J].
D'Alconzo, Alessandro ;
Drago, Idilio ;
Morichetta, Andrea ;
Mellia, Marco ;
Casas, Pedro .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :800-813
[9]   Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning [J].
Duan, Guanghan ;
Lv, Hongwu ;
Wang, Huiqiang ;
Feng, Guangsheng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :699-714
[10]   SPOTLIGHT: Detecting Anomalies in Streaming Graphs [J].
Eswaran, Dhivya ;
Faloutsos, Christos ;
Guha, Sudipto ;
Mishra, Nina .
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2018, :1378-1386