A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

03/01/2022
by   Jhon Alexánder Parra, et al.
0

Given the increased growing of Internet of Things networks and their presence in critical aspects of human activities, the security of devices connected to these networks becomes critical. Machine Learning approaches are becoming prominent as enablers for security solutions in computer networks due to its capacity to process traffic information in order to detect abnormal patterns which might represent attacks targeting infrastructures. In this paper, we propose to leverage Convolutional and Recurrent Neural Networks, two artifacts that have been successfully used in contexts such as image processing for pattern recognition, for the development of a security solution to be used in the context of Internet of Things. Our results show that this approach, when evaluated with a state-of-the-art data set, achieves around 99 the binary classification of attacks (i.e. normal traffic vs attack traffic) and 96 attacks) accuracy. These results outperform proposals available in literature, showing a promising landscape for developing security solutions for IoT infrastructures.

READ FULL TEXT

page 1

page 4

page 6

research
12/02/2020

IoT DoS and DDoS Attack Detection using ResNet

The network attacks are increasing both in frequency and intensity with ...
research
08/30/2021

Security For System-On-Chip (SoC) Using Neural Networks

With the growth of embedded systems, VLSI design phases complexity and c...
research
02/18/2023

OMINACS: Online ML-Based IoT Network Attack Detection and Classification System

Several Machine Learning (ML) methodologies have been proposed to improv...
research
07/27/2018

Internet of Things Security and Forensics: Challenges and Opportunities

The Internet of Things (IoT) envisions pervasive, connected, and smart n...
research
11/12/2018

A Lightweight Signature-Based IDS for IoT Environment

With the advent of large-scale heterogeneous networks comes the problem ...
research
11/03/2020

Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)

Attacks targeting network infrastructure devices pose a threat to the se...
research
03/01/2019

TamperNN: Efficient Tampering Detection of Deployed Neural Nets

Neural networks are powering the deployment of embedded devices and Inte...

Please sign up or login with your details

Forgot password? Click here to reset