DeepAuditor: Distributed Online Intrusion Detection System for IoT
devices via Power Side-channel Auditing
- URL: http://arxiv.org/abs/2106.12753v1
- Date: Thu, 24 Jun 2021 03:32:23 GMT
- Title: DeepAuditor: Distributed Online Intrusion Detection System for IoT
devices via Power Side-channel Auditing
- Authors: Woosub Jung (1), Yizhou Feng (2), Sabbir Ahmed Khan (2), Chunsheng Xin
(2), Danella Zhao (2), and Gang Zhou (1) ((1) William & Mary, (2) Old
Dominion University)
- Abstract summary: This study aimed to design an online intrusion detection system called DeepAuditor for IoT devices via power auditing.
We first proposed a lightweight power auditing device called Power Auditor.
In order to protect data leakage and reduce networking redundancy, we also proposed a privacy-preserved inference protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As the number of IoT devices has increased rapidly, IoT botnets have
exploited the vulnerabilities of IoT devices. However, it is still challenging
to detect the initial intrusion on IoT devices prior to massive attacks. Recent
studies have utilized power side-channel information to characterize this
intrusion behavior on IoT devices but still lack real-time detection
approaches. This study aimed to design an online intrusion detection system
called DeepAuditor for IoT devices via power auditing. To realize the real-time
system, we first proposed a lightweight power auditing device called Power
Auditor. With the Power Auditor, we developed a Distributed CNN classifier for
online inference in our laboratory setting. In order to protect data leakage
and reduce networking redundancy, we also proposed a privacy-preserved
inference protocol via Packed Homomorphic Encryption and a sliding window
protocol in our system. The classification accuracy and processing time were
measured in our laboratory settings. We also demonstrated that the distributed
CNN design is secure against any distributed components. Overall, the
measurements were shown to the feasibility of our real-time distributed system
for intrusion detection on IoT devices.
Related papers
- Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing [1.4474137122906163]
Existing anomaly detection schemes may trigger an overwhelmingly large number of false alerts.
We develop an effective and efficient framework, named CUMAD, to detect compromised IoT devices.
We show that CUMAD can on average reduce the false positive rate from about 3.57% using only the autoencoder-based anomaly detection scheme to about 0.5%.
arXiv Detail & Related papers (2024-04-21T15:33:17Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT
Systems [30.16714420093091]
Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks.
This article proposes a novel deep neural network/architecture called Constrained Twin Variational Auto-Encoder (CTVAE)
CTVAE can boost around 1% in terms of accuracy and Fscore in detection attack compared to the state-of-the-art machine learning and representation learning methods.
arXiv Detail & Related papers (2023-12-05T04:42:04Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways [45.44831696628473]
This paper presents IoTScent, an open-source forensic tool that enables IoT gateways and Home Automation platforms to perform IoT traffic capture and analysis.
IoTScent is specifically designed to operate over IEEE5.4-based traffic, which is the basis for many IoT-specific protocols such as Zigbee, 6LoWPAN and Thread.
This work provides a comprehensive description of the IoTScent tool, including a practical use case that demonstrates the use of the tool to perform device identification from Zigbee traffic.
arXiv Detail & Related papers (2023-10-05T09:10:05Z) - An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT
Devices [0.7219077740523682]
This work proposes a Host-based Intrusion Detection Systems that leverages Federated Learning and Multi-Layer Perceptron neural networks to detected cyberattacks on IoT devices with high accuracy and enhancing data privacy protection.
arXiv Detail & Related papers (2023-06-23T11:26:00Z) - Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic
Monitoring of MUD Activity [1.294952045574009]
Anomaly-based detection methods are promising in finding new attacks.
There are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively.
In this paper, we use SDN to enforce and monitor the expected behaviors of each IoT device.
arXiv Detail & Related papers (2023-04-11T05:17:51Z) - Evaluating Short-Term Forecasting of Multiple Time Series in IoT
Environments [67.24598072875744]
Internet of Things (IoT) environments are monitored via a large number of IoT enabled sensing devices.
To alleviate this issue, sensors are often configured to operate at relatively low sampling frequencies.
This can hamper dramatically subsequent decision-making, such as forecasting.
arXiv Detail & Related papers (2022-06-15T19:46:59Z) - Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement
Learning [73.85267769520715]
Internet of Things (IoT) with its growing number of deployed devices and applications raises significant challenges for network maintenance procedures.
We formulate a problem of autonomous maintenance in IoT networks as a Partially Observable Markov Decision Process.
We utilize Deep Reinforcement Learning algorithms (DRL) to train agents that decide if a maintenance procedure is in order or not and, in the former case, the proper type of maintenance needed.
arXiv Detail & Related papers (2020-12-31T11:19:51Z) - IoT Behavioral Monitoring via Network Traffic Analysis [0.45687771576879593]
This thesis is the culmination of our efforts to develop techniques to profile the network behavioral pattern of IoTs.
We develop a robust machine learning-based inference engine trained with attributes from traffic patterns.
We demonstrate real-time classification of 28 IoT devices with over 99% accuracy.
arXiv Detail & Related papers (2020-01-28T23:13:12Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.