Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul Networks

被引:1
作者
Zhou, Ke [1 ,2 ]
Lin, Xi [1 ,2 ,3 ]
Wu, Jun [1 ,2 ,3 ,4 ]
Bashir, Ali Kashif [5 ]
Li, Jianhua [1 ,2 ]
Imran, Muhammad [6 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai, Peoples R China
[3] Collaborat Innovat Ctr Shanghai Ind Internet, Shanghai, Peoples R China
[4] Waseda Univ, Fac Sci & Engn, Tokyo, Japan
[5] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[6] Federat Univ, Sch Engn Informat Technol & Phys Sci, Ballarat, Vic, Australia
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
基金
中国国家自然科学基金;
关键词
Malicious Node Detection; Backhaul/Fronthaul Network; Few-Shot Metric Learning; Internet of Things;
D O I
10.1109/GLOBECOM48099.2022.10001659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of backhaul/fronthaul networks can enable low latency and high reliability, but nodes in future networks like Internet of Things (IoT) can conduct malicious activities like flooding attack and DDoS attack, which can decrease QoS of smart backhaul/fronthaul network. Timely detection of malicious nodes in future networks is significant for low-latency backhaul/fronthaul networks. However, conventional supervised learning-based detection models require abundant malicious training samples, while capturing adequate malicious samples can not meet the requirement of timely detection. In this paper, we propose a novel few-shot malicious node detection system for improving QoS of IoT backhaul/fronthaul network, which can detect malicious nodes with unknown malicious activities through a limited number of network traffic samples. In our proposed system, we first design a fresh IoT traffic sample processing approach, which integrates normal activity samples and known malicious activity samples to generate training pairs. Then, we design a metric learning-based malicious node detection model training method, which employs a contrastive loss over distance metric to distinguish between similar and dissimilar pairs of samples. Besides, the trained model can detect nodes with unknown malicious activities by comparing real-time samples with few-shot samples of malicious nodes. Finally, the proposed system is evaluated on a real-world IoT network dataset named N-BaIoT. The exhaustive experiment results show that our model can achieve an average accuracy around 97.67% when detecting malicious nodes with unknown malicious activities, which is comparable to state-of-the-art supervised learning models while our model only needs 5-shot samples of malicious node.
引用
收藏
页码:5777 / 5782
页数:6
相关论文
共 13 条
[1]  
Amouri A, 2018, 2018 IEEE 19TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON)
[2]   Few-shot learning in deep networks through global prototyping [J].
Blaes, Sebastian ;
Burwick, Thomas .
NEURAL NETWORKS, 2017, 94 :159-172
[3]   Flexible and Reliable UAV-Assisted Backhaul Operation in 5G mmWave Cellular Networks [J].
Gapeyenko, Margarita ;
Petrov, Vitaly ;
Moltchanov, Dmitri ;
Andreev, Sergey ;
Himayat, Nageen ;
Koucheryavy, Yevgeni .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (11) :2486-2496
[4]   Developing a Siamese Network for Intrusion Detection Systems [J].
Hindy, Hanan ;
Tachtatzis, Christos ;
Atkinson, Robert ;
Bayne, Ethan ;
Bellekens, Xavier .
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING AND SYSTEMS (EUROMLSYS'21), 2021, :120-126
[5]   Predictive Bandwidth Allocation Scheme With Traffic Pattern and Fluctuation Tracking for TDM-PON-Based Mobile Fronthaul [J].
Hisano, Daisuke ;
Uzawa, Hiroyuki ;
Nakayama, Yu ;
Nakamura, Hirotaka ;
Terada, Jun ;
Otaka, Akihiro .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (11) :2508-2517
[6]  
Hoffer E., 2014, DEEP METRIC LEARNING
[7]   IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis [J].
Kumar, Rakesh ;
Swarnkar, Mayank ;
Singal, Gaurav ;
Kumar, Neeraj .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) :989-1008
[8]   Research progress on preparation, characterization, and application of nanoparticle-based microencapsulated phase change materials [J].
Lin, Xiangwei ;
Zhang, Xuelai ;
Ji, Jun ;
Zheng, Lingyu .
INTERNATIONAL JOURNAL OF ENERGY RESEARCH, 2021, 45 (07) :9831-9857
[9]   Ultrawideband Textile Antenna for Wearable Microwave Medical Imaging Applications [J].
Lin, Xiaoyou ;
Chen, Yifan ;
Gong, Zheng ;
Seet, Boon-Chong ;
Huang, Ling ;
Lu, Yilong .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2020, 68 (06) :4238-4249
[10]   N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [J].
Meidan, Yair ;
Bohadana, Michael ;
Mathov, Yael ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Breitenbacher, Dominik ;
Elovici, Yuval .
IEEE PERVASIVE COMPUTING, 2018, 17 (03) :12-22