Revisiting IoT Device Identification
- URL: http://arxiv.org/abs/2107.07818v1
- Date: Fri, 16 Jul 2021 11:01:45 GMT
- Title: Revisiting IoT Device Identification
- Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav,
Anna Maria Mandalari, Richard Mortier, Hamed Haddadi
- Abstract summary: Internet-of-Things (IoT) devices are known to be the source of many security problems.
We explore how to accurately identify IoT devices based on their network behavior.
- Score: 4.451756374933898
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Internet-of-Things (IoT) devices are known to be the source of many security
problems, and as such, they would greatly benefit from automated management.
This requires robustly identifying devices so that appropriate network security
policies can be applied. We address this challenge by exploring how to
accurately identify IoT devices based on their network behavior, while
leveraging approaches previously proposed by other researchers.
We compare the accuracy of four different previously proposed machine
learning models (tree-based and neural network-based) for identifying IoT
devices. We use packet trace data collected over a period of six months from a
large IoT test-bed. We show that, while all models achieve high accuracy when
evaluated on the same dataset as they were trained on, their accuracy degrades
over time, when evaluated on data collected outside the training set. We show
that on average the models' accuracy degrades after a couple of weeks by up to
40 percentage points (on average between 12 and 21 percentage points). We argue
that, in order to keep the models' accuracy at a high level, these need to be
continuously updated.
Related papers
- Towards Efficient Machine Learning Method for IoT DDoS Attack Detection [0.0]
DDoS attacks conducted with IoT devices can cause a significant downtime of applications running on the Internet.
We propose a hybrid feature selection algorithm that selects only the most useful features and passes those features into an XGBoost model.
Our model attains an accuracy of 99.993% on the CIC IDS 2017 dataset and a recall of 97.64 % on the CIC IoT 2023 dataset.
arXiv Detail & Related papers (2024-08-16T09:41:54Z) - Collaborative Learning with a Drone Orchestrator [79.75113006257872]
A swarm of intelligent wireless devices train a shared neural network model with the help of a drone.
The proposed framework achieves a significant speedup in training, leading to an average 24% and 87% saving in the drone hovering time.
arXiv Detail & Related papers (2023-03-03T23:46:25Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - Unsupervised Ensemble Based Deep Learning Approach for Attack Detection
in IoT Network [0.0]
Internet of Things (IoT) has altered living by controlling devices/things over the Internet.
To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks.
In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset.
arXiv Detail & Related papers (2022-07-16T11:12:32Z) - Robust Federated Learning for execution time-based device model
identification under label-flipping attack [0.0]
Device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched.
Several solutions have emerged to identify device models and types based on the combination of behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques.
New approaches such as Federated Learning (FL) have not been fully explored yet, especially when malicious clients are present in the scenario setup.
arXiv Detail & Related papers (2021-11-29T10:27:14Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - The Case for Retraining of ML Models for IoT Device Identification at
the Edge [0.026215338446228163]
We show how to identify IoT devices based on their network behavior using resources available at the edge of the network.
It is possible to achieve device identification and categorization with over 80% and 90% accuracy respectively at the edge.
arXiv Detail & Related papers (2020-11-17T13:01:04Z) - Superiority of Simplicity: A Lightweight Model for Network Device
Workload Prediction [58.98112070128482]
We propose a lightweight solution for series prediction based on historic observations.
It consists of a heterogeneous ensemble method composed of two models - a neural network and a mean predictor.
It achieves an overall $R2$ score of 0.10 on the available FedCSIS 2020 challenge dataset.
arXiv Detail & Related papers (2020-07-07T15:44:16Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z) - Stance Detection Benchmark: How Robust Is Your Stance Detection? [65.91772010586605]
Stance Detection (StD) aims to detect an author's stance towards a certain topic or claim.
We introduce a StD benchmark that learns from ten StD datasets of various domains in a multi-dataset learning setting.
Within this benchmark setup, we are able to present new state-of-the-art results on five of the datasets.
arXiv Detail & Related papers (2020-01-06T13:37:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.