Learning to Detect Anomalous Wireless Links in IoT Networks
- URL: http://arxiv.org/abs/2008.05232v2
- Date: Mon, 23 Nov 2020 20:38:50 GMT
- Title: Learning to Detect Anomalous Wireless Links in IoT Networks
- Authors: Gregor Cerar, Halil Yetgin, Bla\v{z} Bertalani\v{c}, Carolina Fortuna
- Abstract summary: We introduce four types of wireless network anomalies that are identified at the link layer.
We study the performance of threshold- and machine learning (ML)-based classifiers to automatically detect these anomalies.
Our results demonstrate that; i) selected supervised approaches are able to detect anomalies with F1 scores of above 0.98, while unsupervised ones are also capable of detecting the said anomalies with F1 scores of, on average, 0.90, and ii) OC-SVM outperforms all the other unsupervised ML approaches reaching at F1 scores of 0.99 for SuddenD, 0.95 for SuddenR, 0.93 for InstaD
- Score: 1.0017195276758455
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: After decades of research, the Internet of Things (IoT) is finally permeating
real-life and helps improve the efficiency of infrastructures and processes as
well as our health. As a massive number of IoT devices are deployed, they
naturally incur great operational costs to ensure intended operations. To
effectively handle such intended operations in massive IoT networks, automatic
detection of malfunctioning, namely anomaly detection, becomes a critical but
challenging task. In this paper, motivated by a real-world experimental IoT
deployment, we introduce four types of wireless network anomalies that are
identified at the link layer. We study the performance of threshold- and
machine learning (ML)-based classifiers to automatically detect these
anomalies. We examine the relative performance of three supervised and three
unsupervised ML techniques on both non-encoded and encoded (autoencoder)
feature representations. Our results demonstrate that; i) selected supervised
approaches are able to detect anomalies with F1 scores of above 0.98, while
unsupervised ones are also capable of detecting the said anomalies with F1
scores of, on average, 0.90, and ii) OC-SVM outperforms all the other
unsupervised ML approaches reaching at F1 scores of 0.99 for SuddenD, 0.95 for
SuddenR, 0.93 for InstaD and 0.95 for SlowD.
Related papers
- Self-supervised Feature Adaptation for 3D Industrial Anomaly Detection [59.41026558455904]
We focus on multi-modal anomaly detection. Specifically, we investigate early multi-modal approaches that attempted to utilize models pre-trained on large-scale visual datasets.
We propose a Local-to-global Self-supervised Feature Adaptation (LSFA) method to finetune the adaptors and learn task-oriented representation toward anomaly detection.
arXiv Detail & Related papers (2024-01-06T07:30:41Z) - CADeSH: Collaborative Anomaly Detection for Smart Homes [17.072108188004396]
We propose a two-step collaborative anomaly detection method.
It first uses an autoencoder to differentiate frequent (benign') and infrequent (possibly malicious') traffic flows.
Clustering is then used to analyze only the infrequent flows and classify them as either known ('rare yet benign') or unknown (malicious')
arXiv Detail & Related papers (2023-03-02T07:22:26Z) - PULL: Reactive Log Anomaly Detection Based On Iterative PU Learning [58.85063149619348]
We propose PULL, an iterative log analysis method for reactive anomaly detection based on estimated failure time windows.
Our evaluation shows that PULL consistently outperforms ten benchmark baselines across three different datasets.
arXiv Detail & Related papers (2023-01-25T16:34:43Z) - NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale
Network Attacks [9.194664029847019]
We show how to use Machine Learning for Network Intrusion Detection (NID) in a principled way.
We propose NetSentry, perhaps the first of its kind NIDS that builds on Bi-ALSTM, an original ensemble of sequential neural models.
We demonstrate F1 score gains above 33% over the state-of-the-art, as well as up to 3 times higher rates of detecting attacks such as XSS and web bruteforce.
arXiv Detail & Related papers (2022-02-20T17:41:02Z) - Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and
Supervised Learning Methods in Adversarial Environments [63.942632088208505]
Inherent to today's operating environment is the practice of adversarial machine learning.
In this work, we examine the feasibility of unsupervised learning and graph-based methods for anomaly detection.
We incorporate a realistic adversarial training mechanism when training our supervised models to enable strong classification performance in adversarial environments.
arXiv Detail & Related papers (2021-05-14T10:05:10Z) - RLAD: Time Series Anomaly Detection through Reinforcement Learning and
Active Learning [17.089402177923297]
We introduce a new semi-supervised, time series anomaly detection algorithm.
It uses deep reinforcement learning and active learning to efficiently learn and adapt to anomalies in real-world time series data.
It requires no manual tuning of parameters and outperforms all state-of-art methods we compare with.
arXiv Detail & Related papers (2021-03-31T15:21:15Z) - An Experimental Analysis of Attack Classification Using Machine Learning
in IoT Networks [3.9236397589917127]
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices.
As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems to cope with these attacks efficiently.
In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS
arXiv Detail & Related papers (2021-01-10T11:48:37Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - ASFD: Automatic and Scalable Face Detector [129.82350993748258]
We propose a novel Automatic and Scalable Face Detector (ASFD)
ASFD is based on a combination of neural architecture search techniques as well as a new loss design.
Our ASFD-D6 outperforms the prior strong competitors, and our lightweight ASFD-D0 runs at more than 120 FPS with Mobilenet for VGA-resolution images.
arXiv Detail & Related papers (2020-03-25T06:00:47Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.