A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive Hashing

被引:0
|
作者
Hernandez-Jaimes, Mireya Lucia [1 ]
Martinez-Cruz, Alfonso [1 ,2 ]
Ramirez-Gutierrez, Kelseyalejandra [1 ,2 ]
机构
[1] Inst Nacl Astrofis Opt & Elect INAOE, Comp Sci Dept, Luis Enrique Erro 1, Puebla 72840, Mexico
[2] Consejo Nacl Humanidades Ciencia & Tecnol CONAHCYT, Ave Insurgentes 1582, Mexico City 03940, Mexico
关键词
Internet of Things; Anomaly detection; Intrusion detection; Artificial intelligence; Machine learning; Locality-sensitive hashing; INTRUSION DETECTION; TON-IOT;
D O I
10.1016/j.vlsi.2024.102159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing connectivity of devices on the Internet of Things (IoT) has created a favorable field for attacks. Consequently, current anomaly-based intrusion detection systems (AIDS) integrate artificial intelligence algorithms, such as machine learning (ML) and deep learning (DL), to manage high data volumes, recognize complex patterns, and detect unknown anomalies. However, the effectiveness of these methods is contingent upon the quality and meaningfulness of the extracted features from IoT-based communications. Also, with the growth of the IoT, feature extraction and selection are becoming increasingly difficult due to data heterogeneity, the generation of massive amounts of information, and the lack of feature standardization. Moreover, current proposals rely on complex feature extraction and selection techniques. As a result, this study introduces a novel approach for ML modeling, including decision trees and random forests, to detect anomalies in IoT. This study aims to overcome feature extraction and selection process dependency by integrating fingerprinting techniques based on locality-sensitive hashing (LSH) to represent network packet information in a suitable format for ML modeling and detecting harmful sequential network packets. The anomaly detection performance was assessed using two benchmark IoT datasets, ToN-IoT and MQTT-IoT, which contain cyberattacks threatening IoT networks. The proposal outperforms other methods regarding accuracy, precision, and FPR with values of 99.82%, 99.93%, and 0.13%, respectively.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Learnable Locality-Sensitive Hashing for Video Anomaly Detection
    Lu, Yue
    Cao, Congqi
    Zhang, Yifan
    Zhang, Yanning
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (02) : 963 - 976
  • [2] Fast anomaly detection with locality-sensitive hashing and hyperparameter autotuning
    Meira, Jorge
    Eiras-Franco, Carlos
    Bolon-Canedo, Veronica
    Marreiros, Goreti
    Alonso-Betanzos, Amparo
    [J]. INFORMATION SCIENCES, 2022, 607 : 1245 - 1264
  • [3] In Defense of Locality-Sensitive Hashing
    Ding, Kun
    Huo, Chunlei
    Fan, Bin
    Xiang, Shiming
    Pan, Chunhong
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (01) : 87 - 103
  • [4] Kernelized Locality-Sensitive Hashing
    Kulis, Brian
    Grauman, Kristen
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2012, 34 (06) : 1092 - 1104
  • [5] Correlated Locality-Sensitive Hashing
    Pagh, Rasmus
    [J]. ALGORITHMS - ESA 2015, 2015, 9294
  • [6] Locality-Sensitive Hashing for Long Context Neural Machine Translation
    Petrick, Frithjof
    Rosendahl, Jan
    Herold, Christian
    Ney, Hermann
    [J]. PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SPOKEN LANGUAGE TRANSLATION (IWSLT 2022), 2022, : 32 - 42
  • [7] An Improved Algorithm for Locality-Sensitive Hashing
    Cen, Wei
    Miao, Kehua
    [J]. 10TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2015), 2015, : 61 - 64
  • [8] Bit Reduction for Locality-Sensitive Hashing
    Liu, Huawen
    Zhou, Wenhua
    Zhang, Hong
    Li, Gang
    Zhang, Shichao
    Li, Xuelong
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (09) : 12470 - 12481
  • [9] Video anomaly detection based on locality sensitive hashing filters
    Zhang, Ying
    Lu, Huchuan
    Zhang, Lihe
    Ruan, Xiang
    Sakai, Shun
    [J]. PATTERN RECOGNITION, 2016, 59 : 302 - 311
  • [10] Optimal Parameters for Locality-Sensitive Hashing
    Slaney, Malcolm
    Lifshits, Yury
    He, Junfeng
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (09) : 2604 - 2623