Lightweight collaborative anomaly detection for the IoT using blockchain

被引:37
作者
Mirsky, Yisroel [1 ,2 ]
Golomb, Tomer [2 ]
Elovici, Yuval [2 ]
机构
[1] Georgia Inst Technol, Georgia Tech, Coll Comp, Atlanta, GA 30332 USA
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
IoT security; Markov-chain; Anomaly detection; Blockchain; Collaborative security; INTRUSION DETECTION; INTERNET; SCHEME;
D O I
10.1016/j.jpdc.2020.06.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner. However, anomaly detection models must be trained for a long time in order to capture all benign behaviors. Furthermore, the anomaly detection model is vulnerable to adversarial attacks since, during the training phase, all observations are assumed to be benign. In this paper, we propose (1) a novel approach for anomaly detection and (2) a lightweight framework that utilizes the blockchain to ensemble an anomaly detection model in a distributed environment. Blockchain framework incrementally updates a trusted anomaly detection model via self-attestation and consensus among the IoT devices. We evaluate our method on a distributed IoT simulation platform, which consists of 48 Raspberry Pis. The simulation demonstrates how the approach can enhance the security of each device and the security of the network as a whole. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:75 / 97
页数:23
相关论文
共 71 条
[51]   Return-Oriented Programming [J].
Prandini, Marco ;
Ramilli, Marco .
IEEE SECURITY & PRIVACY, 2012, 10 (06) :84-87
[52]   SVELTE: Real-time intrusion detection in the Internet of Things [J].
Raza, Shahid ;
Wallgren, Linus ;
Voigt, Thiemo .
AD HOC NETWORKS, 2013, 11 (08) :2661-2674
[53]  
Sarkar P.G., 2013, ATTACKS SSL COMPREHE
[54]  
Schneier B., E COMMUNICATION
[55]  
Schneier B., 2014, WiredOpinion
[56]  
Sebastian, 2011, ZIMP SOURC
[57]  
Shacham H., 2004, P 11 ACM C COMP COMM, P298
[58]  
Shetty S., 2019, BLOCKCHAIN DISTRIBUT
[59]   Blockchain-based PKI solutions for IoT [J].
Singla, Ankush ;
Bertino, Elisa .
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, :9-15
[60]  
SNAPP SR, 1991, 14TH NATIONAL COMPUTER SECURITY CONFERENCE - INFORMATION SYSTEMS SECURITY: REQUIREMENTS & PRACTICES, PROCEEDINGS, VOLS 1 AND 2, P167