Smart home anomaly-based IDS: Architecture proposal and case study

被引:7
|
作者
Lara, Agustin [1 ]
Mayor, Vicente [1 ]
Estepa, Rafael [1 ]
Estepa, Antonio [1 ]
Diaz-Verdejo, Jesus E. [2 ]
机构
[1] Univ Seville, Dept Telemat Engn, C-Camino Descubrimientos S-N, Seville 41092, Spain
[2] Univ Granada, Dept Signal Theory Telemat & Commun, C-Periodista Daniel Saucedo Aranda S-N, E-18071 Granada, Spain
关键词
IDS; A-IDS; Anomaly detection; Smart home; IDS architecture proposal; CYBER SECURITY CHALLENGES; INTRUSION DETECTION; INTERNET; THINGS; FRAMEWORK; PRIVACY; ATTACKS;
D O I
10.1016/j.iot.2023.100773
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison.In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
    Tufan, Emrah
    Tezcan, Cihangir
    Acarturk, Cengiz
    [J]. IEEE ACCESS, 2021, 9 : 50078 - 50092
  • [32] How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Estepa, Antonio
    Madinabeitia, German
    [J]. IEEE ACCESS, 2020, 8 (44410-44425) : 44410 - 44425
  • [33] Security architecture testing using IDS - a case study
    Verwoerd, T
    Hunt, R
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1402 - 1412
  • [34] Anomaly Detection for Smart Home Based on User Behavior
    Yamauchi, Masaaki
    Ohsita, Yuichi
    Murata, Masayuki
    Ueda, Kensuke
    Kato, Yoshiaki
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [35] TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
    Min, Erxue
    Long, Jun
    Liu, Qiang
    Cui, Jianjing
    Chen, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [36] A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures
    Clotet, Xavier
    Moyano, Jose
    Leon, Gladys
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 : 11 - 20
  • [37] A Smart Home Architecture Based on Concept Ontology
    Hu, ManDong
    Wei, ZhiQiang
    Cong, YanPing
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1559 - 1564
  • [38] On the Study of Anomaly-based Spam Filtering Using Spam as Representation of Normality
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Santos, Igor
    Sanz, Borja
    Nieves, Javier
    Bringas, Pablo G.
    [J]. 2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 693 - 695
  • [39] A STUDY OF MACHINE LEARNING CLASSIFIERS FOR ANOMALY-BASED MOBILE BOTNET DETECTION
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Amalina, Fairuz
    Ma'arof, Ra'uf Ridzuan
    Shamshirband, Shahaboddin
    [J]. MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2013, 26 (04) : 251 - 265
  • [40] Anomaly-based change in higher education: The case of a large, Turkish public university
    Simsek, H
    Aytemiz, D
    [J]. HIGHER EDUCATION, 1998, 36 (02) : 155 - 179