Lumen: A Framework for Developing and Evaluating ML-Based IoT Network Anomaly Detection

被引:4
作者
Sharma, Rahul Anand [1 ]
Sabane, Ishan [2 ]
Apostolaki, Maria [1 ,3 ]
Rowe, Anthony [1 ]
Sekar, Vyas [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IIT Madra, Madras, Tamil Nadu, India
[3] Princeton Univ, Princeton, NJ USA
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, CONEXT 2022 | 2022年
关键词
ATTACKS;
D O I
10.1145/3555050.3569129
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of IoT devices brings a lot of security risks. To mitigate them, researchers have introduced various promising networkbased anomaly detection algorithms, which oftentimes leverage machine learning. Unfortunately, though, their deployment and further improvement by network operators and the research community are hampered. We believe this is due to three key reasons. First, known ML-based anomaly detection algorithms are evaluated -in the best case- on a couple of publicly available datasets, making it hard to compare across algorithms. Second, each ML-based IoT anomaly-detection algorithm makes assumptions about attacker practices/classification granularity, which reduce their applicability. Finally, the implementation of those algorithms is often monolithic, prohibiting code reuse. To ease deployment and promote research in this area, we present Lumen. Lumen is a modular framework paired with a benchmarking suite that allows users to efficiently develop, evaluate, and compare IoT ML-based anomaly detection algorithms. We demonstrate the utility of Lumen by implementing state-of-the-art anomaly detection algorithms and faithfully evaluating them on various datasets. Among other interesting insights that could inform real-world deployments and future research, using Lumen, we were able to identify what algorithms are most suitable to detect particular types of attacks. Lumen can also be used to construct new algorithms with better performance by combining the building blocks of competing efforts and improving the training setup.
引用
收藏
页码:59 / 71
页数:13
相关论文
共 50 条