Lightweight collaborative anomaly detection for the IoT using blockchain

被引:37
作者
Mirsky, Yisroel [1 ,2 ]
Golomb, Tomer [2 ]
Elovici, Yuval [2 ]
机构
[1] Georgia Inst Technol, Georgia Tech, Coll Comp, Atlanta, GA 30332 USA
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
IoT security; Markov-chain; Anomaly detection; Blockchain; Collaborative security; INTRUSION DETECTION; INTERNET; SCHEME;
D O I
10.1016/j.jpdc.2020.06.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner. However, anomaly detection models must be trained for a long time in order to capture all benign behaviors. Furthermore, the anomaly detection model is vulnerable to adversarial attacks since, during the training phase, all observations are assumed to be benign. In this paper, we propose (1) a novel approach for anomaly detection and (2) a lightweight framework that utilizes the blockchain to ensemble an anomaly detection model in a distributed environment. Blockchain framework incrementally updates a trusted anomaly detection model via self-attestation and consensus among the IoT devices. We evaluate our method on a distributed IoT simulation platform, which consists of 48 Raspberry Pis. The simulation demonstrates how the approach can enhance the security of each device and the security of the network as a whole. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:75 / 97
页数:23
相关论文
共 71 条
[1]   C-FLAT: Control-Flow Attestation for Embedded Systems Software [J].
Abera, Tigist ;
Asokan, N. ;
Davi, Lucas ;
Ekberg, Jan-Erik ;
Nyman, Thomas ;
Paverd, Andrew ;
Sadeghi, Ahmad-Reza ;
Tsudik, Gene .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :743-754
[2]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[3]  
Adams C., 2005, TECH REP
[4]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[5]  
[Anonymous], 2003, TECH REP
[6]  
[Anonymous], 2018, P JOINT EUR C MACH L
[7]  
[Anonymous], 2003, P 11 IEEE INT C CIT
[8]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[9]  
ARM, 2019, TRUSTZ CORT M ARM
[10]  
ARM, 2017, INS NUMB 100 BILL AR