Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network

被引:19
作者
Hwang, Ren-Hung [1 ]
Peng, Min-Chun [1 ]
Huang, Chien-Wei [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Info Engn, Chiayi, Taiwan
来源
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2019年
关键词
IoT security; Malicious traffic detection; Deep learning; Convolutional Neural Network; Autoendcoder;
D O I
10.1109/gcwkshps45667.2019.9024425
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the rise of the Internet of Things, a variety of devices have been made intelligent and connected to the Internet. However, the huge number of constantly connected but usually unattended IoT devices have made them one of the major sources of Interent attacks, e.g., a large-scale DDoS attack launching by millions of Mirai-injected compromised IoT devices in 2016. In order to mitigate DDoS attacks against IoT botnets, in this work, we proposed an effective malicious IoT traffic detection mechanism based on deep learning techniques. Specifically, we adopt convolutional neural network (CNN) to extract features of flows, then apply autoencoder to perform unsupervised malicious IoT traffic classification. Our goal is to be able to detect a malicious flow by examining as few of its packets as possible. To validate our proposed mechanism, we evaluate our model using both open data set from previous literature as well as the data set collected from a Mirai botnet we have built. Our experimental results show that the proposed mechanism is effective to detect malicious flows with near 100% accuracy, while only examining the first 2 packets of a flow.
引用
收藏
页数:6
相关论文
共 24 条
[1]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[2]  
[Anonymous], 2018, IEEE ACCESS, V6, P52843
[3]   Learning Representations for Log Data in Cybersecurity [J].
Arnaldo, Ignacio ;
Cuesta-Infante, Alfredo ;
Arun, Ankit ;
Lam, Mei ;
Bassias, Costas ;
Veeramachaneni, Kalyan .
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 :250-268
[4]  
Bacon M., 2018, NEW MIRAI VARIANT AT
[5]  
Biersack E., 2013, LECT NOTES COMPUTER, V7754
[6]  
Bonderud Douglas, 2016, LEAKED MIRAI MALWARE
[7]   Effect of Cooling and Shot Peening on Residual Stresses and Fatigue Performance of Milled Inconel 718 [J].
Chen, Zhe ;
Peng, Ru Lin ;
Moverare, Johan ;
Widman, Olle ;
Gustafsson, David ;
Johansson, Sten .
RESIDUAL STRESSES 2016: ICRS-10, 2017, 2 :13-18
[8]   Issues and Future Directions in Traffic Classification [J].
Dainotti, Alberto ;
Pescape, Antonio ;
Claffy, Kimberly C. .
IEEE NETWORK, 2012, 26 (01) :35-40
[9]  
Gatlan S., 2019, MIRAI BOTNET VARIANT
[10]   IoDDoS - The Internet of Distributed Denial of Service Attacks A Case Study of the Mirai Malware and IoT-Based Botnets [J].
Hallman, Roger ;
Bryan, Josiah ;
Palavicini, Geancarlo ;
Divita, Joseph ;
Romero-Mariona, Jose .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :47-+