Anomaly Detection for Smart Home Based on User Behavior

被引:18
作者
Yamauchi, Masaaki [1 ]
Ohsita, Yuichi [1 ]
Murata, Masayuki [1 ]
Ueda, Kensuke [2 ]
Kato, Yoshiaki [3 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
[2] Mitsubishi Electr Corp, Adv Technol R&D Ctr, Tokyo, Japan
[3] Mitsubishi Electr Corp, Informat Technol R&D Ctr, Tokyo, Japan
来源
2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE) | 2019年
关键词
Anomaly Detection; IoT; Security; Smart Home; Behavior Pattern; Operation by Attackers; Consumer Electronics; CHALLENGES; INTERNET; THINGS;
D O I
10.1109/icce.2019.8661976
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many devices, such as air conditioners and refrigerators, are now being connected to the Internet and, as a consequence, have become targets of cyberattacks. Especially, the operations by attackers can cause serious problems, which may harm users. However, such attacks are difficult to detect because they use the same protocol as legitimate operations by users. In this paper, we propose a method to detect such attacks based on user behavior. We model user behavior as a sequence of events, which includes the operation of IoT devices and other behavior monitored by any sensors. Our method learns sequences of events for each one of a predefined set of conditions and detects attacks by comparing the sequences of the events including the current operation with the learned sequences. We evaluate our method by using data collected by monitoring the behavior of four users. Based on the results of this evaluation, we demonstrate the accuracy of our method and discuss the limitations of our method.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2017, 120000 IOT CAMERAS V
[2]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[3]  
Bishop Christopher M., 2006, Pattern recognition and machine learning, V4
[4]  
Capellupo Marc, 2017, Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017: International Workshops. Proceedings: LNCS 10658, P593, DOI 10.1007/978-3-319-72395-2_54
[5]  
Farooq M.U., 2015, International journal of computer applications, V111, P1, DOI [10.5120/19547-1280, DOI 10.5120/19547-1280]
[6]   Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [J].
Komninos, Nikos ;
Philippou, Eleni ;
Pitsillides, Andreas .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1933-1954
[7]   The Internet of Things (IoT): Applications, investments, and challenges for enterprises [J].
Lee, In ;
Lee, Kyoochun .
BUSINESS HORIZONS, 2015, 58 (04) :431-440
[8]   Qantifying the Reflective DDoS Attack Capability of Household IoT Devices [J].
Lyu, Minzhao ;
Sherratt, Dainel ;
Sivanathan, Arunan ;
Gharakheili, Hassan Habibi ;
Radford, Adam ;
Sivaraman, Vijay .
PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, :46-51
[9]   Fending off IoT-Hunting Attacks at Home Networks [J].
Martin, Vincentius ;
Cao, Qiang ;
Benson, Theophilus .
CAN'17: PROCEEDINGS OF THE 2017 CLOUD-ASSISTED NETWORKING WORKSHOP, 2017, :67-72
[10]  
Pa Y.M.P., 2016, J Inf Process, V24, P522, DOI 10.2197/ipsjjip.24.522