Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
- URL: http://arxiv.org/abs/2006.10587v1
- Date: Thu, 18 Jun 2020 14:50:08 GMT
- Title: Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
- Authors: Yisroel Mirsky, Tomer Golomb, Yuval Elovici
- Abstract summary: Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
- Score: 40.52854197326305
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Due to their rapid growth and deployment, the Internet of things (IoT) have
become a central aspect of our daily lives. Unfortunately, IoT devices tend to
have many vulnerabilities which can be exploited by an attacker. Unsupervised
techniques, such as anomaly detection, can be used to secure these devices in a
plug-and-protect manner.
However, anomaly detection models must be trained for a long time in order to
capture all benign behaviors. Furthermore, the anomaly detection model is
vulnerable to adversarial attacks since, during the training phase, all
observations are assumed to be benign. In this paper, we propose (1) a novel
approach for anomaly detection and (2) a lightweight framework that utilizes
the blockchain to ensemble an anomaly detection model in a distributed
environment.
Blockchain framework incrementally updates a trusted anomaly detection model
via self-attestation and consensus among the IoT devices. We evaluate our
method on a distributed IoT simulation platform, which consists of 48 Raspberry
Pis. The simulation demonstrates how the approach can enhance the security of
each device and the security of the network as a whole.
Related papers
- Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning
Attacks in Federated Learning [98.43475653490219]
Federated learning (FL) is susceptible to poisoning attacks.
FreqFed is a novel aggregation mechanism that transforms the model updates into the frequency domain.
We demonstrate that FreqFed can mitigate poisoning attacks effectively with a negligible impact on the utility of the aggregated model.
arXiv Detail & Related papers (2023-12-07T16:56:24Z) - Discretization-based ensemble model for robust learning in IoT [8.33619265970446]
We propose a discretization-based ensemble stacking technique to improve the security of machine learning models.
We evaluate the performance of different ML-based IoT device identification models against white box and black box attacks.
arXiv Detail & Related papers (2023-07-18T03:48:27Z) - Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic
Monitoring of MUD Activity [1.294952045574009]
Anomaly-based detection methods are promising in finding new attacks.
There are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively.
In this paper, we use SDN to enforce and monitor the expected behaviors of each IoT device.
arXiv Detail & Related papers (2023-04-11T05:17:51Z) - Self-Supervised Masked Convolutional Transformer Block for Anomaly
Detection [122.4894940892536]
We present a novel self-supervised masked convolutional transformer block (SSMCTB) that comprises the reconstruction-based functionality at a core architectural level.
In this work, we extend our previous self-supervised predictive convolutional attentive block (SSPCAB) with a 3D masked convolutional layer, a transformer for channel-wise attention, as well as a novel self-supervised objective based on Huber loss.
arXiv Detail & Related papers (2022-09-25T04:56:10Z) - AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble
Inference Models against Adversarial Volumetric Attacks on IoT Networks [1.1172382217477126]
We present AdIoTack, a system that highlights vulnerabilities of decision trees against adversarial attacks.
To assess the model for the worst-case scenario, AdIoTack performs white-box adversarial learning to launch successful volumetric attacks.
We demonstrate how the model detects all non-adversarial volumetric attacks on IoT devices while missing many adversarial ones.
arXiv Detail & Related papers (2022-03-18T08:18:03Z) - Clustering Algorithm to Detect Adversaries in Federated Learning [0.6091702876917281]
In this paper, we have proposed an approach that detects the adversaries with the help of a clustering algorithm.
Our proposed gradient filtration approach does not require any processing power from the client-side and does not use excessive bandwidth.
Our approach has been very successful in boosting the global model accuracy, up to 99% even in the presence of 40% adversaries.
arXiv Detail & Related papers (2021-02-22T06:49:59Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.