Botnet Attack Detection at the IoT Edge Based on Sparse Representation

被引:27
作者
Tzagkarakis, Christos [1 ,2 ]
Petroulakis, Nikolaos [1 ]
Ioannidis, Sotiris [1 ]
机构
[1] Fdn Res & Technol Hellas FORTH, Inst Comp Sci, Iraklion, Greece
[2] Univ Crete, Dept Comp Sci, Iraklion, Greece
来源
2019 GLOBAL IOT SUMMIT (GIOTS) | 2019年
基金
欧盟地平线“2020”;
关键词
IoT edge; botnet attack detection; sparse representation; reconstruction error threshold; small-sized data; INTRUSION DETECTION; INTERNET; THINGS; CHALLENGES; CLOUD; SECURITY; PRIVACY;
D O I
10.1109/giots.2019.8766388
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet-of-Things (IoT) aims at interconnecting thousands or millions of smart objects/devices in a seamless way by sensing, processing and analyzing huge amount of data obtained from heterogeneous IoT devices. This rapid development of IoT-oriented infrastructures comes at the cost of increased security threats through IoT-based botnet attacks. In this work, we present an IoT botnet attack detection method based on a sparsity representation framework using a reconstruction error thresholding rule for identifying malicious network traffic at the IoT edge coming from compromised IoT devices. The botnet attack detection is performed based on small-sized benign IoT network traffic data, and thus we have no prior knowledge about malicious IoT traffic data. We present our results on a real IoT-based network dataset and show the efficacy of our proposed technique against a reconstruction error-based autoencoder approach.
引用
收藏
页数:6
相关论文
共 32 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   RFID Technology for IoT-Based Personal Healthcare in Smart Spaces [J].
Amendola, Sara ;
Lodato, Rossella ;
Manzari, Sabina ;
Occhiuzzi, Cecilia ;
Marrocco, Gaetano .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (02) :144-152
[3]   Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach [J].
Bostani, Hamid ;
Sheikhan, Mansour .
COMPUTER COMMUNICATIONS, 2017, 98 :52-71
[4]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[5]  
Butun I, 2015, IEEE INT CONF COMM, P2610, DOI 10.1109/ICCW.2015.7247572
[6]   Industrial Internet of Things monitoring solution for advanced predictive maintenance applications [J].
Civerchia, Federico ;
Bocchino, Stefano ;
Salvadori, Claudio ;
Rossi, Enrico ;
Maggiani, Luca ;
Petracca, Matteo .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 7 :4-12
[7]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[8]   IoDDoS - The Internet of Distributed Denial of Service Attacks A Case Study of the Mirai Malware and IoT-Based Botnets [J].
Hallman, Roger ;
Bryan, Josiah ;
Palavicini, Geancarlo ;
Divita, Joseph ;
Romero-Mariona, Jose .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :47-+
[9]   Developing Vehicular Data Cloud Services in the IoT Environment [J].
He, Wu ;
Yan, Gongjun ;
Xu, Li Da .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) :1587-1595
[10]   Towards the Implementation of IoT for Environmental Condition Monitoring in Homes [J].
Kelly, Sean Dieter Tebje ;
Suryadevara, Nagender Kumar ;
Mukhopadhyay, Subhas Chandra .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3846-3853