Unsupervised machine learning for network-centric anomaly detection in IoT

被引:46
作者
Bhatia, Randeep [1 ]
Benno, Steven [1 ]
Esteban, Jairo [1 ]
Lakshman, T., V [1 ]
Grogan, John [2 ]
机构
[1] Nokia Bell Labs, Murray Hill, NJ 07974 USA
[2] C Spire, Ridgeland, MS USA
来源
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS | 2019年
关键词
IoT; Anomaly Detection; Machine Learning; Unsupervised Learning; Networks; DDoS; SYSTEMS;
D O I
10.1145/3359992.3366641
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industry 4.0 holds the promise of greater automation and productivity but also introduces new security risks to critical industrial control systems from unsecured devices and machines. Networks need to play a larger role in stopping attacks before they disrupt essential infrastructure as host-centric IT security solutions, such as anti-virus and software patching, have been ineffective in preventing IoT devices from getting compromised. We propose a network-centric, behavior-learning based, anomaly detection approach for securing such vulnerable environments. We demonstrate that the predictability of TCP traffic from IoT devices can be exploited to detect different types of DDoS attacks in real-time, using unsupervised machine learning (ML). From a small set of features, our ML classifier can separate normal and anomalous traffic. Our approach can be incorporated in a larger system for identifying compromised end-points despite IP spoofing, thus allowing the use of SDN-based mechanisms for blocking attack traffic close to the source. Compared to supervised ML methods, our unsupervised ML approaches are easier to instrument and are more effective in detecting new and unseen attacks.
引用
收藏
页码:42 / 48
页数:7
相关论文
共 21 条
[1]  
[Anonymous], 2014, INT C MACH LEARN
[2]  
[Anonymous], 2017, INT JOINT C NEUR NET
[3]  
[Anonymous], 2003, INN TEC SER
[4]  
[Anonymous], 2012, P ICML WORKSHOP UNSU
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]  
Dargenio R., 2018, IEEE DEEP LEARN SEC
[8]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[9]  
Ferreira D. C., 2019, IEEE IJCNN
[10]  
Gaddam S. R., 2007, IEEE T KNOWLEDGE DAT