Semi-supervised Variational Temporal Convolutional Network for IoT
Communication Multi-anomaly Detection
- URL: http://arxiv.org/abs/2104.01813v1
- Date: Mon, 5 Apr 2021 08:51:24 GMT
- Title: Semi-supervised Variational Temporal Convolutional Network for IoT
Communication Multi-anomaly Detection
- Authors: Yan Xu, Yongliang Cheng
- Abstract summary: Internet of Things (IoT) devices are constructed to build a huge communications network.
These devices are insecure in reality, it means that the communications network are exposed by the attacker.
In this paper, we propose SS-VTCN, a semi-supervised network for IoT multiple anomaly detection.
- Score: 3.3659034873495632
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The consumer Internet of Things (IoT) have developed in recent years. Mass
IoT devices are constructed to build a huge communications network. But these
devices are insecure in reality, it means that the communications network are
exposed by the attacker. Moreover, the IoT communication network also faces
with variety of sudden errors. Therefore, it easily leads to that is vulnerable
with the threat of attacker and system failure. The severe situation of IoT
communication network motivates the development of new techniques to
automatically detect multi-anomaly. In this paper, we propose SS-VTCN, a
semi-supervised network for IoT multiple anomaly detection that works well
effectively for IoT communication network. SS-VTCN is designed to capture the
normal patterns of the IoT traffic data based on the distribution whether it is
labeled or not by learning their representations with key techniques such as
Variational Autoencoders and Temporal Convolutional Network. This network can
use the encode data to predict preliminary result, and reconstruct input data
to determine anomalies by the representations. Extensive evaluation experiments
based on a benchmark dataset and a real consumer smart home dataset demonstrate
that SS-VTCN is more suitable than supervised and unsupervised method with
better performance when compared other state-of-art semi-supervised method.
Related papers
- AI Flow at the Network Edge [58.31090055138711]
AI Flow is a framework that streamlines the inference process by jointly leveraging the heterogeneous resources available across devices, edge nodes, and cloud servers.
This article serves as a position paper for identifying the motivation, challenges, and principles of AI Flow.
arXiv Detail & Related papers (2024-11-19T12:51:17Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT
Systems [30.16714420093091]
Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks.
This article proposes a novel deep neural network/architecture called Constrained Twin Variational Auto-Encoder (CTVAE)
CTVAE can boost around 1% in terms of accuracy and Fscore in detection attack compared to the state-of-the-art machine learning and representation learning methods.
arXiv Detail & Related papers (2023-12-05T04:42:04Z) - Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic
Monitoring of MUD Activity [1.294952045574009]
Anomaly-based detection methods are promising in finding new attacks.
There are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively.
In this paper, we use SDN to enforce and monitor the expected behaviors of each IoT device.
arXiv Detail & Related papers (2023-04-11T05:17:51Z) - Unsupervised Ensemble Based Deep Learning Approach for Attack Detection
in IoT Network [0.0]
Internet of Things (IoT) has altered living by controlling devices/things over the Internet.
To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks.
In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset.
arXiv Detail & Related papers (2022-07-16T11:12:32Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - IoT Behavioral Monitoring via Network Traffic Analysis [0.45687771576879593]
This thesis is the culmination of our efforts to develop techniques to profile the network behavioral pattern of IoTs.
We develop a robust machine learning-based inference engine trained with attributes from traffic patterns.
We demonstrate real-time classification of 28 IoT devices with over 99% accuracy.
arXiv Detail & Related papers (2020-01-28T23:13:12Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z) - Anomalous Communications Detection in IoT Networks Using Sparse
Autoencoders [0.0]
We present a method to detect anomalous network communications in IoT networks using a set of sparse autoencoders.
The proposed approach allows us to differentiate malicious communications from legitimate ones.
Depending on the value of N, the developed model achieves attack detection rates ranging from 86.9% to 91.2%, and false positive rates ranging from 0.1% to 0.5%.
arXiv Detail & Related papers (2019-12-26T10:47:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.