Applying machine learning and parallel data processing for attack detection in IoT

被引:11
作者
Branitskiy, Alexander [1 ]
Kotenko, Igor [1 ]
Saenko, Igor [1 ]
机构
[1] Russian Acad Sci SPIIRAS, St Petersburg Inst Informat & Automat, Liniya 14 Ya,39, St Petersburg 199178, Russia
关键词
Machine learning; Data processing; Task analysis; Training; Sparks; Security; Computer networks; parallel processing; security and privacy protection; classifier design and evaluation;
D O I
10.1109/TETC.2020.3006351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks are kind of computer networks for which the problem of information security and, in particular, computer attack detection is acute. For solving this task the paper proposes a joint application of methods of machine learning and parallel data processing. The structure of basic classifiers is determined, which are designed for detecting the attacks in IoT networks, and a new approach to their combining is proposed. The statement of classification problem is formed in which the integral indicator of effectiveness is the ratio of accuracy to time of training and testing. For enhancing the speed of training and testing we propose the usage of the distributed data processing system Spark and multi-threaded mode. Moreover, a dataset pre-processing procedure is suggested, which leads to a significant reduction of the training sample volume. An experimental assessment of the proposed approach shows that the attack detection accuracy in IoT networks approaches 100 percent, and the speed of dataset processing increases in proportion to the number of parallel threads.
引用
收藏
页码:1642 / 1653
页数:12
相关论文
共 31 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
[Anonymous], 2016, INT J COMPUT SCI MOB
[3]  
[Anonymous], 2016, DATA ANAL HADOOP INT
[4]  
[Anonymous], 2015, EDBT
[5]  
[Anonymous], 2015, INT J SOFTW ENG ITS, DOI DOI 10.14257/IJSEIA.2015.9.7.10
[6]  
[Anonymous], 2011, How the next evolution of the internet is changing everything
[7]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[8]   A Survey of Deep Learning Methods for Cyber Security [J].
Berman, Daniel S. ;
Buczak, Anna L. ;
Chavis, Jeffrey S. ;
Corbett, Cherita L. .
INFORMATION, 2019, 10 (04)
[9]   Security and privacy aspects in MapReduce on clouds: A survey [J].
Derbeko, Philip ;
Dolev, Shlomi ;
Gudes, Ehud ;
Sharma, Shantanu .
COMPUTER SCIENCE REVIEW, 2016, 20 (20) :1-28
[10]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768