Detecting Attacks on IoT Devices using Featureless 1D-CNN
        - URL: http://arxiv.org/abs/2109.03989v1
 - Date: Thu, 9 Sep 2021 01:22:36 GMT
 - Title: Detecting Attacks on IoT Devices using Featureless 1D-CNN
 - Authors: Arshiya Khan, Chase Cotton
 - Abstract summary: Featureless machine learning enables a low cost and low memory time-series analysis of network traffic.
It benefits from eliminating the significant investment in subject matter experts and the time required for feature engineering.
 - Score: 0.0
 - License: http://creativecommons.org/licenses/by/4.0/
 - Abstract:   The generalization of deep learning has helped us, in the past, address
challenges such as malware identification and anomaly detection in the network
security domain. However, as effective as it is, scarcity of memory and
processing power makes it difficult to perform these tasks in Internet of
Things (IoT) devices. This research finds an easy way out of this bottleneck by
depreciating the need for feature engineering and subsequent processing in
machine learning techniques. In this study, we introduce a Featureless machine
learning process to perform anomaly detection. It uses unprocessed byte streams
of packets as training data. Featureless machine learning enables a low cost
and low memory time-series analysis of network traffic. It benefits from
eliminating the significant investment in subject matter experts and the time
required for feature engineering.
 
       
      
        Related papers
        - Real-time Threat Detection Strategies for Resource-constrained Devices [1.4815508281465273]
We present an end-to-end process designed to effectively address DNS-tunneling attacks in a router.
We demonstrate that utilizing stateless features for training the ML model, along with features chosen to be independent of the network configuration, leads to highly accurate results.
The deployment of this carefully crafted model, optimized for embedded devices across diverse environments, resulted in high DNS-tunneling attack detection with minimal latency.
arXiv  Detail & Related papers  (2024-03-22T10:02:54Z) - Locality Sensitive Hashing for Network Traffic Fingerprinting [5.062312533373298]
We use locality-sensitive hashing (LSH) for network traffic fingerprinting.
Our method increases the accuracy of state-of-the-art by 12% achieving around 94% accuracy in identifying devices in a network.
arXiv  Detail & Related papers  (2024-02-12T21:14:37Z) - Quantization-aware Neural Architectural Search for Intrusion Detection [5.010685611319813]
We present a design methodology that automatically trains and evolves quantized neural network (NN) models that are a thousand times smaller than state-of-the-art NNs.
The number of LUTs utilized by this network when deployed to an FPGA is between 2.3x and 8.5x smaller with performance comparable to prior work.
arXiv  Detail & Related papers  (2023-11-07T18:35:29Z) - Using Machine Learning To Identify Software Weaknesses From Software
  Requirement Specifications [49.1574468325115]
This research focuses on finding an efficient machine learning algorithm to identify software weaknesses from requirement specifications.
 Keywords extracted using latent semantic analysis help map the CWE categories to PROMISE_exp. Naive Bayes, support vector machine (SVM), decision trees, neural network, and convolutional neural network (CNN) algorithms were tested.
arXiv  Detail & Related papers  (2023-08-10T13:19:10Z) - Efficient Attack Detection in IoT Devices using Feature Engineering-Less
  Machine Learning [0.0]
This research proposes a way to overcome the barrier by bypassing feature engineering in the deep learning pipeline and using raw packet data as input.
We introduce a feature engineering-less machine learning (ML) process to perform malware detection on IoT devices.
Our proposed model, "Feature engineering-less-ML (FEL-ML)," is a lighter-weight detection algorithm that expends no extra computations on "engineered" features.
arXiv  Detail & Related papers  (2023-01-09T17:26:37Z) - Deep Reinforcement Learning Assisted Federated Learning Algorithm for
  Data Management of IIoT [82.33080550378068]
The continuous expanded scale of the industrial Internet of Things (IIoT) leads to IIoT equipments generating massive amounts of user data every moment.
How to manage these time series data in an efficient and safe way in the field of IIoT is still an open issue.
This paper studies the FL technology applications to manage IIoT equipment data in wireless network environments.
arXiv  Detail & Related papers  (2022-02-03T07:12:36Z) - An Automated Data Engineering Pipeline for Anomaly Detection of IoT
  Sensor Data [0.0]
System of Chip technology, Internet of Things (IoT), cloud computing, and artificial intelligence has brought more possibilities of improving and solving the current problems.
Data analytics and the use of machine learning/deep learning makes it possible to learn the underlying patterns and make decisions based on what was learned from massive data generated from IoT sensors.
Process involves the use of IoT sensors, Raspberry Pis, Amazon Web Services (AWS) and multiple machine learning techniques with the intent to identify anomalous cases for the smart home security system.
arXiv  Detail & Related papers  (2021-09-28T15:57:29Z) - Automated Machine Learning Techniques for Data Streams [91.3755431537592]
This paper surveys the state-of-the-art open-source AutoML tools, applies them to data collected from streams, and measures how their performance changes over time.
The results show that off-the-shelf AutoML tools can provide satisfactory results but in the presence of concept drift, detection or adaptation techniques have to be applied to maintain the predictive accuracy over time.
arXiv  Detail & Related papers  (2021-06-14T11:42:46Z) - Machine Learning for Massive Industrial Internet of Things [69.52379407906017]
Industrial Internet of Things (IIoT) revolutionizes the future manufacturing facilities by integrating the Internet of Things technologies into industrial settings.
With the deployment of massive IIoT devices, it is difficult for the wireless network to support the ubiquitous connections with diverse quality-of-service (QoS) requirements.
We first summarize the requirements of the typical massive non-critical and critical IIoT use cases. We then identify unique characteristics in the massive IIoT scenario, and the corresponding machine learning solutions with its limitations and potential research directions.
arXiv  Detail & Related papers  (2021-03-10T20:10:53Z) - Towards AIOps in Edge Computing Environments [60.27785717687999]
This paper describes the system design of an AIOps platform which is applicable in heterogeneous, distributed environments.
It is feasible to collect metrics with a high frequency and simultaneously run specific anomaly detection algorithms directly on edge devices.
arXiv  Detail & Related papers  (2021-02-12T09:33:00Z) - Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement
  Learning [73.85267769520715]
Internet of Things (IoT) with its growing number of deployed devices and applications raises significant challenges for network maintenance procedures.
We formulate a problem of autonomous maintenance in IoT networks as a Partially Observable Markov Decision Process.
We utilize Deep Reinforcement Learning algorithms (DRL) to train agents that decide if a maintenance procedure is in order or not and, in the former case, the proper type of maintenance needed.
arXiv  Detail & Related papers  (2020-12-31T11:19:51Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.