Collaborative adversary nodes learning on the logs of IoT devices in an
IoT network
- URL: http://arxiv.org/abs/2112.12546v1
- Date: Wed, 22 Dec 2021 02:56:22 GMT
- Title: Collaborative adversary nodes learning on the logs of IoT devices in an
IoT network
- Authors: Sandhya Aneja, Melanie Ang Xuan En, Nagender Aneja
- Abstract summary: We propose an improved approach for IoT security from data perspective.
The Adversary Learning (AdLIoTLog) model is proposed using Recurrent Neural Network (RNN)
Our results show that the predicting performance of the AdLIoTLog model trained by our method degrades by 3-4% in the presence of attack.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Artificial Intelligence (AI) development has encouraged many new research
areas, including AI-enabled Internet of Things (IoT) network. AI analytics and
intelligent paradigms greatly improve learning efficiency and accuracy.
Applying these learning paradigms to network scenarios provide technical
advantages of new networking solutions. In this paper, we propose an improved
approach for IoT security from data perspective. The network traffic of IoT
devices can be analyzed using AI techniques. The Adversary Learning (AdLIoTLog)
model is proposed using Recurrent Neural Network (RNN) with attention mechanism
on sequences of network events in the network traffic. We define network events
as a sequence of the time series packets of protocols captured in the log. We
have considered different packets TCP packets, UDP packets, and HTTP packets in
the network log to make the algorithm robust. The distributed IoT devices can
collaborate to cripple our world which is extending to Internet of
Intelligence. The time series packets are converted into structured data by
removing noise and adding timestamps. The resulting data set is trained by RNN
and can detect the node pairs collaborating with each other. We used the BLEU
score to evaluate the model performance. Our results show that the predicting
performance of the AdLIoTLog model trained by our method degrades by 3-4% in
the presence of attack in comparison to the scenario when the network is not
under attack. AdLIoTLog can detect adversaries because when adversaries are
present the model gets duped by the collaborative events and therefore predicts
the next event with a biased event rather than a benign event. We conclude that
AI can provision ubiquitous learning for the new generation of Internet of
Things.
Related papers
- Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Intrusion Detection in Internet of Things using Convolutional Neural
Networks [4.718295605140562]
We propose a novel solution to the intrusion attacks against IoT devices using CNNs.
The data is encoded as the convolutional operations to capture the patterns from the sensors data along time.
The experimental results show significant improvement in both true positive rate and false positive rate compared to the baseline using LSTM.
arXiv Detail & Related papers (2022-11-18T07:27:07Z) - Unsupervised Ensemble Based Deep Learning Approach for Attack Detection
in IoT Network [0.0]
Internet of Things (IoT) has altered living by controlling devices/things over the Internet.
To bring down the IoT network, attackers can utilise these devices to conduct a variety of network attacks.
In this paper, we have developed an unsupervised ensemble learning model that is able to detect new or unknown attacks in an IoT network from an unlabelled dataset.
arXiv Detail & Related papers (2022-07-16T11:12:32Z) - Modelling DDoS Attacks in IoT Networks using Machine Learning [21.812642970826563]
TCP-specific attacks are one of the most plausible tools that attackers can use on Cyber-Physical Systems.
This study compares the effectiveness of supervised, unsupervised, and semi-supervised machine learning algorithms for detecting DDoS attacks in CPS-IoT.
arXiv Detail & Related papers (2021-12-10T12:09:26Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - IoT Security: Botnet detection in IoT using Machine learning [0.0]
This research work is to propose an innovative model using machine learning algorithm to detect and mitigate botnet-based distributed denial of service (DDoS) attack in IoT network.
Our proposed model tackles the security issue concerning the threats from bots.
arXiv Detail & Related papers (2021-04-06T01:47:50Z) - Semi-supervised Variational Temporal Convolutional Network for IoT
Communication Multi-anomaly Detection [3.3659034873495632]
Internet of Things (IoT) devices are constructed to build a huge communications network.
These devices are insecure in reality, it means that the communications network are exposed by the attacker.
In this paper, we propose SS-VTCN, a semi-supervised network for IoT multiple anomaly detection.
arXiv Detail & Related papers (2021-04-05T08:51:24Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - Automating Botnet Detection with Graph Neural Networks [106.24877728212546]
Botnets are now a major source for many network attacks, such as DDoS attacks and spam.
In this paper, we consider the neural network design challenges of using modern deep learning techniques to learn policies for botnet detection automatically.
arXiv Detail & Related papers (2020-03-13T15:34:33Z) - Deep Learning for Ultra-Reliable and Low-Latency Communications in 6G
Networks [84.2155885234293]
We first summarize how to apply data-driven supervised deep learning and deep reinforcement learning in URLLC.
To address these open problems, we develop a multi-level architecture that enables device intelligence, edge intelligence, and cloud intelligence for URLLC.
arXiv Detail & Related papers (2020-02-22T14:38:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.