Smart home anomaly-based IDS: Architecture proposal and case study

被引:7
|
作者
Lara, Agustin [1 ]
Mayor, Vicente [1 ]
Estepa, Rafael [1 ]
Estepa, Antonio [1 ]
Diaz-Verdejo, Jesus E. [2 ]
机构
[1] Univ Seville, Dept Telemat Engn, C-Camino Descubrimientos S-N, Seville 41092, Spain
[2] Univ Granada, Dept Signal Theory Telemat & Commun, C-Periodista Daniel Saucedo Aranda S-N, E-18071 Granada, Spain
关键词
IDS; A-IDS; Anomaly detection; Smart home; IDS architecture proposal; CYBER SECURITY CHALLENGES; INTRUSION DETECTION; INTERNET; THINGS; FRAMEWORK; PRIVACY; ATTACKS;
D O I
10.1016/j.iot.2023.100773
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison.In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Accelerating anomaly-based IDS using Neural Network on GPU
    Nguyen Thi Thanh Van
    Tran Ngoc Thinh
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 67 - 74
  • [2] A Cross-Layer, Anomaly-Based IDS for WSN and MANET
    Amouri, Amar
    Morgera, Salvatore D.
    Bencherif, Mohamed A.
    Manthena, Raju
    [J]. SENSORS, 2018, 18 (02):
  • [3] An Anomaly-Based IDS Framework Using Centroid-Based Classification
    Lin, Iuon-Chang
    Chang, Ching-Chun
    Peng, Chih-Hsiang
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [4] Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks
    Butt, Nazia
    Shahid, Ana
    Qureshi, Kashif Naseer
    Haider, Sajjad
    Ibrahim, Ashraf Osman
    Binzagr, Faisal
    Arshad, Noman
    [J]. MATHEMATICS, 2022, 10 (23)
  • [5] HoneYDSPK: Cisco onePK implementation for Anomaly-based IDS and Honeypot services
    Trandafir, Ruxandra
    Carabas, Mihai
    Rughinis, Razvan
    Tapus, Nicoale
    [J]. 2016 15TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH, 2016,
  • [6] Anomaly-based IDS Implementation in Cloud Environment using BOAT Algorithm
    Vaid, Chetna
    Verma, Harsh K.
    [J]. 2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [7] A Scalable Security Approach in IoT Networks: Smart Contracts and Anomaly-Based IDS for Gateways Using Hardware Accelerators
    Ngo, Duc-Minh
    Lightbody, Dominic
    Temko, Andriy
    Murphy, Colin C.
    Popovici, Emanuel
    [J]. IEEE Access, 2024, 12 : 159519 - 159533
  • [8] A distributed IDS architecture model for Smart Home systems
    Mariusz Gajewski
    Jordi Mongay Batalla
    George Mastorakis
    Constandinos X. Mavromoustakis
    [J]. Cluster Computing, 2019, 22 : 1739 - 1749
  • [9] A distributed IDS architecture model for Smart Home systems
    Gajewski, Mariusz
    Batalla, Jordi Mongay
    Mastorakis, George
    Mavromoustakis, Constandinos X.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1739 - 1749
  • [10] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66