Anomaly traffic detection and correlation in Smart Home automationIoTsystems

被引:14
作者
Gajewski, Mariusz [1 ]
Batalla, Jordi Mongay [2 ]
Mastorakis, George [3 ]
Mavromoustakis, Constandinos X. [4 ]
机构
[1] Inst Telecommun, Internet Technol & Applicat Dept, Warsaw, Poland
[2] Warsaw Univ Technol, Inst Telecommun, Warsaw, Poland
[3] Hellen Mediterranean Univ, Dept Management Sci & Technol, Iraklion, Greece
[4] Univ Nicosia, Dept Comp Sci, Nicosia, Cyprus
关键词
INTRUSION-DETECTION; INTERNET; ATTACKS; SYSTEM;
D O I
10.1002/ett.4053
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Smart building automation systems are increasingly the target of hacking attacks. Moreover, they may be used as a tool for attacks against targets located out of the native Home Area Network (HAN). These attacks are often resulted in changes in traffic volume, damaged packets, increased message traffic, and so on. Symptoms of attacks can be detected as anomalies in traffic model and recognized by a software agent run on Home Gateway. Although these anomalies are detected locally, it may help network provider to protect his resources as well as other resources of his clients. For that purpose, network operator should be able to recognize anomalies and correlate them on the network level. In this way, the network operator has the ability to protect both its own network and HANs of its clients. This article shows that Smart Home security might be coupled with the providers' network security policy. For that reason, security tasks should be performed both in HAN and providers' data center. This article describes a novel strategy for anomaly detection that provides shared responsibility between a service client and the network provider. It uses a machine learning approach for classifying the monitoring data and correlation in searching suspicious behavior across the network resources at the service provider's data center.
引用
收藏
页数:17
相关论文
共 40 条
[1]   INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Gani, Abdullah ;
Imran, Muhammad ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :10-16
[2]   Machine learning for wearable IoT-based applications: A survey [J].
Al-Turjman, Fadi ;
Baali, Ilyes .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
[3]  
Amouri A, 2018, 2018 IEEE 19TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON)
[4]  
[Anonymous], 1997, THESIS
[5]  
[Anonymous], 2018, P IEICE INF COMM TEC
[6]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]   Validation of virtualization platforms for I-IoT purposes [J].
Batalla, Jordi Mongay ;
Sienkiewicz, Konrad ;
Latoszek, Waldemar ;
Krawiec, Piotr ;
Mavromoustakis, Constandinos X. ;
Mastorakis, George .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4227-4241
[9]   ID-based service-oriented communications for unified access to IoT [J].
Batalla, Jordi Mongay ;
Gajewski, Mariusz ;
Latoszek, Waldemar ;
Krawiec, Piotr ;
Mavromoustakis, Constandinos X. ;
Mastorakis, George .
COMPUTERS & ELECTRICAL ENGINEERING, 2016, 52 :98-113
[10]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)