Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders

被引:3
作者
Shahid, Mustafizur R. [1 ]
Blanc, Gregory [1 ]
Zhang, Zonghua [2 ]
Debar, Herve [1 ]
机构
[1] Inst Polytech Paris, Telecom SudParis, CNRS, SAMOVAR, Paris, France
[2] Inst Mines Telecom, IMT Lille Douai, CNRS, SAMOVAR, Paris, France
来源
2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA) | 2019年
关键词
Machine Learning; Neural Network; Anomaly Detection; Internet of Things; Network Security;
D O I
10.1109/nca.2019.8935007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware are constantly evolving and getting more sophisticated. IoT devices are intended to perform very specific tasks, so their networking behavior is expected to be reasonably stable and predictable. Any significant behavioral deviation from the normal patterns would indicate anomalous events. In this paper, we present a method to detect anomalous network communications in IoT networks using a set of sparse autoencoders. The proposed approach allows us to differentiate malicious communications from legitimate ones. So that, if a device is compromised only malicious communications can be dropped while the service provided by the device is not totally interrupted. To characterize network behavior, bidirectional TCP flows are extracted and described using statistics on the size of the first N packets sent and received, along with statistics on the corresponding inter-arrival times between packets. A set of sparse autoencoders is then trained to learn the profile of the legitimate communications generated by an experimental smart home network. Depending on the value of N, the developed model achieves attack detection rates ranging from 86.9% to 91.2 %, and false positive rates ranging from 0.1% to 0.5%.
引用
收藏
页码:165 / 169
页数:5
相关论文
共 22 条
  • [1] [Anonymous], INT SEC THREAT REP 2
  • [2] [Anonymous], 2011, LECT NOTES STANFORD
  • [3] Antonakakis M., 2017, SEC 17
  • [4] Bertino E., 2017, COMPUTER
  • [5] NUMERICAL ANALYSIS OF A COMPOSITE STEEL BOX GIRDER BRIDGE IN FIRE
    Braxtan, Nicole Leo
    Wang, Qian
    Whitney, Reeves
    Koch, Gregory
    [J]. APPLICATIONS OF STRUCTURAL FIRE ENGINEERING, 2017,
  • [6] Cimpanu Catalin, HIDE SEEK BECOMES 1
  • [7] Columbus L., ROUNDUP INTERNET THI
  • [8] Machine Learning DDoS Detection for Consumer Internet of Things Devices
    Doshi, Rohan
    Apthorpe, Noah
    Feamster, Nick
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 29 - 35
  • [9] Greenberg Andy., 2017, The Reaper IoT Botnet Has Already Infected a Million Networks
  • [10] Khan M. A., 2018, FUTURE GENERATION CO