Intrusion Detection using Network Traffic Profiling and Machine Learning
for IoT
- URL: http://arxiv.org/abs/2109.02544v1
- Date: Mon, 6 Sep 2021 15:30:10 GMT
- Title: Intrusion Detection using Network Traffic Profiling and Machine Learning
for IoT
- Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles,
Nicholas Kolokotronis
- Abstract summary: A single compromised device can have an impact on the whole network and lead to major security and physical damages.
This paper explores the potential of using network profiling and machine learning to secure IoT against cyber-attacks.
- Score: 2.309914459672557
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rapid increase in the use of IoT devices brings many benefits to the
digital society, ranging from improved efficiency to higher productivity.
However, the limited resources and the open nature of these devices make them
vulnerable to various cyber threats. A single compromised device can have an
impact on the whole network and lead to major security and physical damages.
This paper explores the potential of using network profiling and machine
learning to secure IoT against cyber-attacks. The proposed anomaly-based
intrusion detection solution dynamically and actively profiles and monitors all
networked devices for the detection of IoT device tampering attempts as well as
suspicious network transactions. Any deviation from the defined profile is
considered to be an attack and is subject to further analysis. Raw traffic is
also passed on to the machine learning classifier for examination and
identification of potential attacks. Performance assessment of the proposed
methodology is conducted on the Cyber-Trust testbed using normal and malicious
network traffic. The experimental results show that the proposed anomaly
detection system delivers promising results with an overall accuracy of 98.35%
and 0.98% of false-positive alarms.
Related papers
- Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks [4.836070911511429]
This paper proposes a novel network intrusion prediction framework that combines Large Language Models (LLMs) with Long Short Term Memory (LSTM) networks.
Our framework, evaluated on the CICIoT2023 IoT attack dataset, demonstrates a significant improvement in predictive capabilities, achieving an overall accuracy of 98%.
arXiv Detail & Related papers (2024-08-26T06:57:22Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Towards a Near-real-time Protocol Tunneling Detector based on Machine Learning Techniques [0.0]
We present a protocol tunneling detector prototype which inspects, in near real time, a company's network traffic using machine learning techniques.
The detector monitors unencrypted network flows and extracts features to detect possible occurring attacks and anomalies.
Results show 97.1% overall accuracy and an F1-score equals to 95.6%.
arXiv Detail & Related papers (2023-09-22T09:08:43Z) - IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber
Deception [31.822346303953164]
Honeypots are an important security tool to understand attacker intent and deceive attackers to spend time and resources.
To build better honeypots and enhance cyber deception capabilities, IoT honeypots need to generate realistic network traffic flows.
We propose a novel deep learning based approach for generating traffic flows that mimic real network traffic due to user and IoT device interactions.
arXiv Detail & Related papers (2023-05-01T16:24:07Z) - OMINACS: Online ML-Based IoT Network Attack Detection and Classification
System [0.0]
This paper proposes an online attack detection and network traffic classification system.
It combines stream Machine Learning, Deep Learning, and Ensemble Learning technique.
It can detect the presence of malicious traffic flows and classify them according to the type of attack they represent.
arXiv Detail & Related papers (2023-02-18T04:06:24Z) - Unsupervised Ensemble Based Deep Learning Approach for Attack Detection
in IoT Network [0.0]
Internet of Things (IoT) has altered living by controlling devices/things over the Internet.
To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks.
In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset.
arXiv Detail & Related papers (2022-07-16T11:12:32Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Automated Identification of Vulnerable Devices in Networks using Traffic
Data and Deep Learning [30.536369182792516]
Device-type identification combined with data from vulnerability databases can pinpoint vulnerable IoT devices in a network.
We present and evaluate two deep learning approaches to the reliable IoT device-type identification.
arXiv Detail & Related papers (2021-02-16T14:49:34Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.