Applying machine learning and parallel data processing for attack detection in IoT

被引:11
作者
Branitskiy, Alexander [1 ]
Kotenko, Igor [1 ]
Saenko, Igor [1 ]
机构
[1] Russian Acad Sci SPIIRAS, St Petersburg Inst Informat & Automat, Liniya 14 Ya,39, St Petersburg 199178, Russia
关键词
Machine learning; Data processing; Task analysis; Training; Sparks; Security; Computer networks; parallel processing; security and privacy protection; classifier design and evaluation;
D O I
10.1109/TETC.2020.3006351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks are kind of computer networks for which the problem of information security and, in particular, computer attack detection is acute. For solving this task the paper proposes a joint application of methods of machine learning and parallel data processing. The structure of basic classifiers is determined, which are designed for detecting the attacks in IoT networks, and a new approach to their combining is proposed. The statement of classification problem is formed in which the integral indicator of effectiveness is the ratio of accuracy to time of training and testing. For enhancing the speed of training and testing we propose the usage of the distributed data processing system Spark and multi-threaded mode. Moreover, a dataset pre-processing procedure is suggested, which leads to a significant reduction of the training sample volume. An experimental assessment of the proposed approach shows that the attack detection accuracy in IoT networks approaches 100 percent, and the speed of dataset processing increases in proportion to the number of parallel threads.
引用
收藏
页码:1642 / 1653
页数:12
相关论文
共 31 条
[21]   A Big Data Architecture for Large Scale Security Monitoring [J].
Marchal, Samuel ;
Jiang, Xiuyan ;
State, Radu ;
Engel, Thomas .
2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, :56-63
[22]   N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [J].
Meidan, Yair ;
Bohadana, Michael ;
Mathov, Yael ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Breitenbacher, Dominik ;
Elovici, Yuval .
IEEE PERVASIVE COMPUTING, 2018, 17 (03) :12-22
[23]  
Nguyen T.T., 2019, DEEP REINFORCEMENT L
[24]  
Priya D., 2016, INT J ADV RES COMPUT, V5, P487, DOI [10.17148/UARCCE.2016.5796, DOI 10.17148/UARCCE.2016.5796]
[25]  
Scherbakov M., 2015, INT J SOFT COMPUT, V10, P218, DOI [10.36478/ijscomp.2015.218.219, DOI 10.36478/IJSCOMP.2015.218.219]
[26]  
Shamili Ashkan Sharifi, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P4348, DOI 10.1109/ICPR.2010.1057
[27]  
Shi Z. J., 2008, INT J NETW SECUR, V7, P141
[28]   A Survey on Representation Learning Efforts in Cybersecurity Domain [J].
Usman, Muhammad ;
Jan, Mian Ahmad ;
He, Xiangjian ;
Chen, Jinjun .
ACM COMPUTING SURVEYS, 2020, 52 (06)
[29]   IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security? [J].
Xiao, Liang ;
Wan, Xiaoyue ;
Lu, Xiaozhen ;
Zhang, Yanyong ;
Wu, Di .
IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) :41-49
[30]  
YU Y., 2008, OSDI