Lumen: A Framework for Developing and Evaluating ML-Based IoT Network Anomaly Detection

被引:4
作者
Sharma, Rahul Anand [1 ]
Sabane, Ishan [2 ]
Apostolaki, Maria [1 ,3 ]
Rowe, Anthony [1 ]
Sekar, Vyas [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IIT Madra, Madras, Tamil Nadu, India
[3] Princeton Univ, Princeton, NJ USA
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, CONEXT 2022 | 2022年
关键词
ATTACKS;
D O I
10.1145/3555050.3569129
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of IoT devices brings a lot of security risks. To mitigate them, researchers have introduced various promising networkbased anomaly detection algorithms, which oftentimes leverage machine learning. Unfortunately, though, their deployment and further improvement by network operators and the research community are hampered. We believe this is due to three key reasons. First, known ML-based anomaly detection algorithms are evaluated -in the best case- on a couple of publicly available datasets, making it hard to compare across algorithms. Second, each ML-based IoT anomaly-detection algorithm makes assumptions about attacker practices/classification granularity, which reduce their applicability. Finally, the implementation of those algorithms is often monolithic, prohibiting code reuse. To ease deployment and promote research in this area, we present Lumen. Lumen is a modular framework paired with a benchmarking suite that allows users to efficiently develop, evaluate, and compare IoT ML-based anomaly detection algorithms. We demonstrate the utility of Lumen by implementing state-of-the-art anomaly detection algorithms and faithfully evaluating them on various datasets. Among other interesting insights that could inform real-world deployments and future research, using Lumen, we were able to identify what algorithms are most suitable to detect particular types of attacks. Lumen can also be used to construct new algorithms with better performance by combining the building blocks of competing efforts and improving the training setup.
引用
收藏
页码:59 / 71
页数:13
相关论文
共 50 条
  • [41] Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network
    Xia, Zhuoqun
    Chen, Yaling
    Yin, Bo
    Liang, Haolan
    Zhou, Hongmei
    Gu, Ke
    Yu, Fei
    EXPERT SYSTEMS, 2023, 40 (04)
  • [42] A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework
    Xu, Congyuan
    Shen, Jizhong
    Du, Xin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3540 - 3552
  • [43] Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network
    Satheesh, N.
    Rathnamma, M. V.
    Rajeshkumar, G.
    Sagar, P. Vidya
    Dadheech, Pankaj
    Dogiwal, S. R.
    Velayutham, Priya
    Sengan, Sudhakar
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 79
  • [44] An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms
    Salman, Emad Hmood
    Taher, Montadar Abas
    Hammadi, Yousif I.
    Mahmood, Omar Abdulkareem
    Muthanna, Ammar
    Koucheryavy, Andrey
    SENSORS, 2023, 23 (01)
  • [45] Siamese Neural Network Based Few-Shot Learning for Anomaly Detection in Industrial Cyber-Physical Systems
    Zhou, Xiaokang
    Liang, Wei
    Shimizu, Shohei
    Ma, Jianhua
    Jin, Qun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5790 - 5798
  • [46] Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID
    Abosata, Nasr
    Al-Rubaye, Saba
    Inalhan, Gokhan
    SENSORS, 2023, 23 (01)
  • [47] Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
    Sheikhan, Mansour
    Jadidi, Zahra
    NEURAL COMPUTING & APPLICATIONS, 2014, 24 (3-4) : 599 - 611
  • [48] Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams
    Dasari, Durga Bhavani
    Edamadaka, Gayathri
    Chowdary, Ch. Smitha
    Sobhana, M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9241 - 9268
  • [49] MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
    Aksu, Dogukan
    Aydin, Muhammed Ali
    COMPUTERS & SECURITY, 2022, 118
  • [50] Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model
    Bang, June-ho
    Cho, Young-jong
    Kang, Kyungran
    COMPUTERS & SECURITY, 2017, 65 : 108 - 120