Detecting Compromised IoT Devices Through XGBoost

被引:8
作者
da Cruz, Mauro A. A. [1 ,2 ]
Abbade, Lucas R. [1 ]
Lorenz, Pascal [2 ]
Mafra, Samuel B. [1 ]
Rodrigues, Joel J. P. C. [3 ,4 ]
机构
[1] Natl Inst Telecommun INATEL, BR-37540000 Santa Rita Do Sapucai, Brazil
[2] Univ Haute Alsace, Network & Telecommun Res Grp, F-68008 Colmar, France
[3] China Univ Petr East China, Coll Comp Sci & Technol, Qingdao 266555, Peoples R China
[4] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Internet of Things; Security; Protocols; Servers; Routing; Authorization; Authentication; IoT; XGBoost; machine learning; security; replication attack; IoT-23; INTERNET; MODEL;
D O I
10.1109/TITS.2022.3187252
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The evolution and rapid adoption of the Internet of Things (IoT) led to a rise in the number of attacks that target IoT environments. IoT environments are vulnerable to several attacks because many devices lack memory, processing power, and battery. Most of these vulnerabilities are relatively easy to mitigate when best practices are followed. However, even when best practices are followed, an attack to obtain a device credential and use it to generate false data is difficult to detect. Such an attack is called a replication attack and its impact can be catastrophic in crucial IoT scenarios such as smart transportation. In this sense, this paper proposes a solution to detect these attacks by analyzing abnormal network traffic through machine learning.
引用
收藏
页码:15392 / 15399
页数:8
相关论文
共 34 条
  • [1] Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review
    Aladaileh, Mohammad A.
    Anbar, Mohammed
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Sanjalawe, Yousef K.
    [J]. IEEE ACCESS, 2020, 8 : 143985 - 143995
  • [2] Consumer IoT: Security Vulnerability Case Studies and Solutions
    Alladi, Tejasvi
    Chamola, Vinay
    Sikdar, Biplab
    Choo, Kim-Kwang Raymond
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 17 - 25
  • [3] [Anonymous], GITHUB KAYSUDHEERANS
  • [4] Barut O., 2020, ARXIV
  • [5] Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03): : 1701 - 1714
  • [6] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [7] XGBoost-Based Instantaneous Drowsiness Detection Framework Using Multitaper Spectral Information of Electroencephalography
    Choi, Hyun-Soo
    Kim, Siwon
    Oh, Jung Eun
    Yoon, Jee Eun
    Park, Jung Ah
    Yun, Chang-Ho
    Yoon, Sungroh
    [J]. ACM-BCB'18: PROCEEDINGS OF THE 2018 ACM INTERNATIONAL CONFERENCE ON BIOINFORMATICS, COMPUTATIONAL BIOLOGY, AND HEALTH INFORMATICS, 2018, : 111 - 121
  • [8] A Reference Model for Internet of Things Middleware
    da Cruz, Mauro A. A.
    Rodrigues, Joel Jose P. C.
    Al-Muhtadi, Jalal
    Korotaev, Valery V.
    de Albuquerque, Victor Hugo C.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 871 - 883
  • [9] LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
    Damasevicius, Robertas
    Venckauskas, Algimantas
    Grigaliunas, Sarunas
    Toldinas, Jevgenijus
    Morkevicius, Nerijus
    Aleliunas, Tautvydas
    Smuikys, Paulius
    [J]. ELECTRONICS, 2020, 9 (05)
  • [10] A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection
    Dutta, Vibekananda
    Choras, Michal
    Pawlicki, Marek
    Kozik, Rafal
    [J]. SENSORS, 2020, 20 (16) : 1 - 20