Design and Implementation of a Hybrid Anomaly Detection System for IoT

被引:13
作者
Ayad, Ahmad [1 ]
Zamani, Alireza [1 ]
Schmeink, Anke [1 ]
Dartmann, Guido [2 ]
机构
[1] Rhein Westfal TH Aachen, ISEK Teaching & Res Area, D-52074 Aachen, Germany
[2] Trier Univ Appl Sci, D-54293 Trier, Germany
来源
2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) | 2019年
关键词
D O I
10.1109/iotsms48152.2019.8939206
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, the dramatic increase in the number of devices has empowered the Internet of Things (IoT). Unfortunately though, IoT networks are susceptible to cyberattacks, due to the limited capabilities of the nodes. Since conventional security designs do not consider such limitations, the development of new solutions, suitable for IoT networks has become an urgent task. In this paper, we propose a modular hybrid anomaly detection system (ADS) for IoT. The proposed system utilizes cloud computing to detect anomalies in both application and network layers and train a neural network in a centralized manner. The obtained neural network weights are then downloaded to the IoT devices. This architecture allows the IoT devices to detect anomalies in a local manner, thereby reducing the communication overhead and detection latency. Also, the ADS has a mechanism to measure the deviation between the local models and the central model. Then, the deviation is used to set the frequency at which the model updates. This allows the system to update the local models less frequently when the deviation is low, further reducing the overhead. The ADS was deployed on a test IoT system and the results proved the advantages of the proposed mechanism in decreasing the detection latency and the communications overhead, while improving the detection accuracy locally.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 15 条
  • [1] Fraud detection system: A survey
    Abdallah, Aisha
    Maarof, Mohd Aizaini
    Zainal, Anazida
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 : 90 - 113
  • [2] An improved and provably secure privacy preserving authentication protocol for SIP
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    ul Hassan, Mahmood
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 1 - 15
  • [3] Dziubany M, 2018, EUR SIGNAL PR CONF, P2050, DOI 10.23919/EUSIPCO.2018.8553155
  • [4] Ester M., 1996, P 2 INT C KNOWL DISC
  • [5] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
  • [6] Lee T.H., 2014, Advanced Technologies, Embedded and Multimedia for Human-Centric Computing: HumanCom and EMC 2013, P1205
  • [7] Lemaître G, 2017, J MACH LEARN RES, V18
  • [8] Marzano A, 2018, IEEE SYMP COMP COMMU, P818
  • [9] N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair
    Bohadana, Michael
    Mathov, Yael
    Mirsky, Yisroel
    Shabtai, Asaf
    Breitenbacher, Dominik
    Elovici, Yuval
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 12 - 22
  • [10] More A., 2016, ARXIV160806048, V1608, P06048, DOI DOI 10.48550/ARXIV.1608.06048