Detecting Attacks on IoT Devices using Featureless 1D-CNN
- URL: http://arxiv.org/abs/2109.03989v1
- Date: Thu, 9 Sep 2021 01:22:36 GMT
- Title: Detecting Attacks on IoT Devices using Featureless 1D-CNN
- Authors: Arshiya Khan, Chase Cotton
- Abstract summary: Featureless machine learning enables a low cost and low memory time-series analysis of network traffic.
It benefits from eliminating the significant investment in subject matter experts and the time required for feature engineering.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The generalization of deep learning has helped us, in the past, address
challenges such as malware identification and anomaly detection in the network
security domain. However, as effective as it is, scarcity of memory and
processing power makes it difficult to perform these tasks in Internet of
Things (IoT) devices. This research finds an easy way out of this bottleneck by
depreciating the need for feature engineering and subsequent processing in
machine learning techniques. In this study, we introduce a Featureless machine
learning process to perform anomaly detection. It uses unprocessed byte streams
of packets as training data. Featureless machine learning enables a low cost
and low memory time-series analysis of network traffic. It benefits from
eliminating the significant investment in subject matter experts and the time
required for feature engineering.
Related papers
- Real-time Threat Detection Strategies for Resource-constrained Devices [1.4815508281465273]
We present an end-to-end process designed to effectively address DNS-tunneling attacks in a router.
We demonstrate that utilizing stateless features for training the ML model, along with features chosen to be independent of the network configuration, leads to highly accurate results.
The deployment of this carefully crafted model, optimized for embedded devices across diverse environments, resulted in high DNS-tunneling attack detection with minimal latency.
arXiv Detail & Related papers (2024-03-22T10:02:54Z) - Locality Sensitive Hashing for Network Traffic Fingerprinting [5.062312533373298]
We use locality-sensitive hashing (LSH) for network traffic fingerprinting.
Our method increases the accuracy of state-of-the-art by 12% achieving around 94% accuracy in identifying devices in a network.
arXiv Detail & Related papers (2024-02-12T21:14:37Z) - Quantization-aware Neural Architectural Search for Intrusion Detection [5.010685611319813]
We present a design methodology that automatically trains and evolves quantized neural network (NN) models that are a thousand times smaller than state-of-the-art NNs.
The number of LUTs utilized by this network when deployed to an FPGA is between 2.3x and 8.5x smaller with performance comparable to prior work.
arXiv Detail & Related papers (2023-11-07T18:35:29Z) - Using Machine Learning To Identify Software Weaknesses From Software
Requirement Specifications [49.1574468325115]
This research focuses on finding an efficient machine learning algorithm to identify software weaknesses from requirement specifications.
Keywords extracted using latent semantic analysis help map the CWE categories to PROMISE_exp. Naive Bayes, support vector machine (SVM), decision trees, neural network, and convolutional neural network (CNN) algorithms were tested.
arXiv Detail & Related papers (2023-08-10T13:19:10Z) - Efficient Attack Detection in IoT Devices using Feature Engineering-Less
Machine Learning [0.0]
This research proposes a way to overcome the barrier by bypassing feature engineering in the deep learning pipeline and using raw packet data as input.
We introduce a feature engineering-less machine learning (ML) process to perform malware detection on IoT devices.
Our proposed model, "Feature engineering-less-ML (FEL-ML)," is a lighter-weight detection algorithm that expends no extra computations on "engineered" features.
arXiv Detail & Related papers (2023-01-09T17:26:37Z) - Deep Reinforcement Learning Assisted Federated Learning Algorithm for
Data Management of IIoT [82.33080550378068]
The continuous expanded scale of the industrial Internet of Things (IIoT) leads to IIoT equipments generating massive amounts of user data every moment.
How to manage these time series data in an efficient and safe way in the field of IIoT is still an open issue.
This paper studies the FL technology applications to manage IIoT equipment data in wireless network environments.
arXiv Detail & Related papers (2022-02-03T07:12:36Z) - An Automated Data Engineering Pipeline for Anomaly Detection of IoT
Sensor Data [0.0]
System of Chip technology, Internet of Things (IoT), cloud computing, and artificial intelligence has brought more possibilities of improving and solving the current problems.
Data analytics and the use of machine learning/deep learning makes it possible to learn the underlying patterns and make decisions based on what was learned from massive data generated from IoT sensors.
Process involves the use of IoT sensors, Raspberry Pis, Amazon Web Services (AWS) and multiple machine learning techniques with the intent to identify anomalous cases for the smart home security system.
arXiv Detail & Related papers (2021-09-28T15:57:29Z) - Automated Machine Learning Techniques for Data Streams [91.3755431537592]
This paper surveys the state-of-the-art open-source AutoML tools, applies them to data collected from streams, and measures how their performance changes over time.
The results show that off-the-shelf AutoML tools can provide satisfactory results but in the presence of concept drift, detection or adaptation techniques have to be applied to maintain the predictive accuracy over time.
arXiv Detail & Related papers (2021-06-14T11:42:46Z) - Machine Learning for Massive Industrial Internet of Things [69.52379407906017]
Industrial Internet of Things (IIoT) revolutionizes the future manufacturing facilities by integrating the Internet of Things technologies into industrial settings.
With the deployment of massive IIoT devices, it is difficult for the wireless network to support the ubiquitous connections with diverse quality-of-service (QoS) requirements.
We first summarize the requirements of the typical massive non-critical and critical IIoT use cases. We then identify unique characteristics in the massive IIoT scenario, and the corresponding machine learning solutions with its limitations and potential research directions.
arXiv Detail & Related papers (2021-03-10T20:10:53Z) - Towards AIOps in Edge Computing Environments [60.27785717687999]
This paper describes the system design of an AIOps platform which is applicable in heterogeneous, distributed environments.
It is feasible to collect metrics with a high frequency and simultaneously run specific anomaly detection algorithms directly on edge devices.
arXiv Detail & Related papers (2021-02-12T09:33:00Z) - Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement
Learning [73.85267769520715]
Internet of Things (IoT) with its growing number of deployed devices and applications raises significant challenges for network maintenance procedures.
We formulate a problem of autonomous maintenance in IoT networks as a Partially Observable Markov Decision Process.
We utilize Deep Reinforcement Learning algorithms (DRL) to train agents that decide if a maintenance procedure is in order or not and, in the former case, the proper type of maintenance needed.
arXiv Detail & Related papers (2020-12-31T11:19:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.