Enhancing IoT Security via Automatic Network Traffic Analysis: The
Transition from Machine Learning to Deep Learning
- URL: http://arxiv.org/abs/2312.00034v1
- Date: Mon, 20 Nov 2023 16:48:50 GMT
- Title: Enhancing IoT Security via Automatic Network Traffic Analysis: The
Transition from Machine Learning to Deep Learning
- Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni
- Abstract summary: This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT)
Our approach involves training and evaluating a DL model using a range of diverse IoT-related datasets.
Experiments showcase the ability of DL to surpass the constraints tied to manually engineered features, achieving superior results in attack detection and maintaining comparable outcomes in device-type identification.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This work provides a comparative analysis illustrating how Deep Learning (DL)
surpasses Machine Learning (ML) in addressing tasks within Internet of Things
(IoT), such as attack classification and device-type identification. Our
approach involves training and evaluating a DL model using a range of diverse
IoT-related datasets, allowing us to gain valuable insights into how adaptable
and practical these models can be when confronted with various IoT
configurations. We initially convert the unstructured network traffic data from
IoT networks, stored in PCAP files, into images by processing the packet data.
This conversion process adapts the data to meet the criteria of DL
classification methods. The experiments showcase the ability of DL to surpass
the constraints tied to manually engineered features, achieving superior
results in attack detection and maintaining comparable outcomes in device-type
identification. Additionally, a notable feature extraction time difference
becomes evident in the experiments: traditional methods require around 29
milliseconds per data packet, while DL accomplishes the same task in just 2.9
milliseconds. The significant time gap, DL's superior performance, and the
recognized limitations of manually engineered features, presents a compelling
call to action within the IoT community. This encourages us to shift from
exploring new IoT features for each dataset to addressing the challenges of
integrating DL into IoT, making it a more efficient solution for real-world IoT
scenarios.
Related papers
- Leveraging Foundation Models for Zero-Shot IoT Sensing [5.319176383069102]
Deep learning models are increasingly deployed on edge Internet of Things (IoT) devices.
ZSL aims to classify data of unseen classes with the help of semantic information.
In this work, we align the IoT data embeddings with the semantic embeddings generated by an FM's text encoder for zero-shot IoT sensing.
arXiv Detail & Related papers (2024-07-29T11:16:48Z) - Towards a Transformer-Based Pre-trained Model for IoT Traffic Classification [0.6060461053918144]
State-of-the-art classification methods are based on Deep Learning.
In real-life situations, where there is a scarce amount of IoT traffic data, the models would not perform so well.
We propose IoT Traffic Classification Transformer (ITCT), which is pre-trained on a large labeled transformer-based IoT traffic dataset.
Experiments demonstrated that ITCT model significantly outperforms existing models, achieving an overall accuracy of 82%.
arXiv Detail & Related papers (2024-07-26T19:13:11Z) - Energy-Efficient Edge Learning via Joint Data Deepening-and-Prefetching [9.468399367975984]
We propose a novel offloading architecture called joint data deepening-and-prefetching (JD2P)
JD2P is feature-by-feature offloading comprising two key techniques.
We evaluate the effectiveness of JD2P through experiments using the MNIST dataset.
arXiv Detail & Related papers (2024-02-19T08:12:47Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Many or Few Samples? Comparing Transfer, Contrastive and Meta-Learning
in Encrypted Traffic Classification [68.19713459228369]
We compare transfer learning, meta-learning and contrastive learning against reference Machine Learning (ML) tree-based and monolithic DL models.
We show that (i) using large datasets we can obtain more general representations, (ii) contrastive learning is the best methodology.
While ML tree-based cannot handle large tasks but fits well small tasks, by means of reusing learned representations, DL methods are reaching tree-based models performance also for small tasks.
arXiv Detail & Related papers (2023-05-21T11:20:49Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - Dynamic Network-Assisted D2D-Aided Coded Distributed Learning [59.29409589861241]
We propose a novel device-to-device (D2D)-aided coded federated learning method (D2D-CFL) for load balancing across devices.
We derive an optimal compression rate for achieving minimum processing time and establish its connection with the convergence time.
Our proposed method is beneficial for real-time collaborative applications, where the users continuously generate training data.
arXiv Detail & Related papers (2021-11-26T18:44:59Z) - Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge
Computing: A Contextual-Bandit Approach [81.5261621619557]
We propose an adaptive anomaly detection scheme with hierarchical edge computing (HEC)
We first construct multiple anomaly detection DNN models with increasing complexity, and associate each of them to a corresponding HEC layer.
Then, we design an adaptive model selection scheme that is formulated as a contextual-bandit problem and solved by using a reinforcement learning policy network.
arXiv Detail & Related papers (2021-08-09T08:45:47Z) - Automated Machine Learning Techniques for Data Streams [91.3755431537592]
This paper surveys the state-of-the-art open-source AutoML tools, applies them to data collected from streams, and measures how their performance changes over time.
The results show that off-the-shelf AutoML tools can provide satisfactory results but in the presence of concept drift, detection or adaptation techniques have to be applied to maintain the predictive accuracy over time.
arXiv Detail & Related papers (2021-06-14T11:42:46Z) - On the Use of Interpretable Machine Learning for the Management of Data
Quality [13.075880857448059]
We propose the use of interpretable machine learning to deliver the features that are important to be based for any data processing activity.
Our aim is to secure data quality, at least, for those features that are detected as significant in the collected datasets.
arXiv Detail & Related papers (2020-07-29T08:49:32Z) - Stance Detection Benchmark: How Robust Is Your Stance Detection? [65.91772010586605]
Stance Detection (StD) aims to detect an author's stance towards a certain topic or claim.
We introduce a StD benchmark that learns from ten StD datasets of various domains in a multi-dataset learning setting.
Within this benchmark setup, we are able to present new state-of-the-art results on five of the datasets.
arXiv Detail & Related papers (2020-01-06T13:37:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.