Identifying Anomaly in IoT Traffic Flow With Locality Sensitive Hashes

被引:0
|
作者
Charyyev, Batyr [1 ]
Hadi Gunes, Mehmet [2 ]
机构
[1] Univ Nevada, Comp Sci & Engn Dept, Reno, NV 89557 USA
[2] Akamai, Boston, MA 02142 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Feature extraction; Telecommunication traffic; Training; Object recognition; Data models; Performance evaluation; networking; traffic fingerprinting;
D O I
10.1109/ACCESS.2024.3420238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices introduce new vulnerabilities to the network. These devices are relatively cheap, have simple design yet they can collect private user data, and be employed as botnets to conduct large-scale attacks. In general, IoT devices have a limited set of functionalities. Thus, the network administrator can formulate the expected traffic patterns of the devices and employ the network traffic to detect malicious activities. Existing systems to detect anomaly in IoT traffic mainly use machine learning. Thus, they require tuning the parameters of models and selecting/extracting a representative set of features from the network traffic data. In this paper, we introduce a novel approach Locality Sensitive Anomaly Detection and Identification (LSADI) to detect anomaly in IoT network traffic based on the locality-sensitive hash of the traffic flow. The proposed approach does not require feature selection/extraction from the data and does not have complex set of parameters that need to be tuned. Evaluation with three datasets containing 25 attacks shows that LSADI can detect and identify the type of anomalous flows with an accuracy above 90% on average and performs equally well compared to the state-of-the-art machine learning-based methods.
引用
收藏
页码:89467 / 89478
页数:12
相关论文
共 50 条
  • [31] Early Detection of LDDoS Attacks in IoT Utilizing Locality Sensitive Incremental TSVM Method
    Yin, Xiaochun
    Liu, Zengguang
    Liu, Deyong
    Liu, Zhenge
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 1336 - 1344
  • [32] A Locality-Sensitive Hashing-Based Jamming Detection System for IoT Networks
    Ganeshkumar, P.
    Albalawi, Talal
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5943 - 5959
  • [33] A Probabilistic Flow Sampling Method for Traffic Anomaly Detection
    Dong Shuqin
    Zhang Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1450 - 1457
  • [34] Explainable Anomaly Detection of Synthetic Medical IoT Traffic Using Machine Learning
    Aversano L.
    Bernardi M.L.
    Cimitile M.
    Montano D.
    Pecori R.
    Veltri L.
    SN Computer Science, 5 (5)
  • [35] Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method
    Liu, ZengGuang
    Yin, XiaoChun
    Yang, RuiPing
    Dong, AnMing
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 194 - 199
  • [36] Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method
    Liu, ZengGuang
    Yin, XiaoChun
    Yang, RuiPing
    Dong, AnMing
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 194 - 199
  • [37] TRAFFIC-LOCALITY-BASED CREATION OF FLOW WHITELISTS FOR SCADA NETWORKS
    Choi, Seungoh
    Chang, Yeop
    Yun, Jeong-Han
    Kim, Woonyon
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 87 - 102
  • [38] Characterizing IoT Networks With Asynchronous Time-Sensitive Periodic Traffic
    Elsawy, Hesham
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (10) : 1696 - 1700
  • [39] Fast Low-Rank Matrix Approximation with Locality Sensitive Hashing for Quick Anomaly Detection
    Xie, Gaogang
    Xie, Kun
    Huang, Jun
    Wang, Xin
    Chen, Yuxiang
    Wen, Jigang
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [40] Double locality sensitive hashing Bloom filter for high-dimensional streaming anomaly detection
    Zeng, Zhixia
    Xiao, Ruliang
    Lin, Xinhong
    Luo, Tianjian
    Lin, Jiayin
    INFORMATION PROCESSING & MANAGEMENT, 2023, 60 (03)