A method for vulnerability detection by IoT network traffic analytics

被引:2
|
作者
Brezolin, Uelinton [1 ]
Vergutz, Andressa [1 ]
Nogueira, Michele [2 ]
机构
[1] Univ Fed Parana, Dept Informat, Curitiba, PR, Brazil
[2] Univ Fed Minas Gerais, Dept Comp Sci, Belo Horizonte, MG, Brazil
基金
巴西圣保罗研究基金会;
关键词
Internet of Things; Vulnerability detection; Entropy; Traffic analysis; CLASSIFICATION;
D O I
10.1016/j.adhoc.2023.103247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things comprises wireless devices with limited computing resources. It targets attacks that exploit vulnerabilities such as unencrypted data transfer. Conventional vulnerability detection occurs from databases that list the most common vulnerabilities and exploits (CVEs). However, these bases are limited to known vulnerabilities, which is not the case for the IoT context most of the time. This work proposes MANDRAKE: a Method for vulnerAbilities detectioN baseD on the IoT netwoRk pAcKEt traffic using machine learning techniques. A performance evaluation has been conducted in a smart home scenario taking as basis two datasets, one generated experimentally for this work and the other from the literature. The results have achieved 99% precision in detecting vulnerabilities in network traffic.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A PCA-based Method for IoT Network Traffic Anomaly Detection
    Dang Hai Hoang
    Ha Duong Nguyen
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 381 - 386
  • [2] Network Traffic-Oriented Malware Detection in IoT
    Zhang Y.
    Wang W.
    Li C.
    Liao Z.
    Feng F.
    Lin Y.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (04): : 602 - 609
  • [3] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy, Vasaki
    Yichiet, Aun
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almufareh, Maram Fahhad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 865 - 879
  • [4] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy V.
    Yichiet A.
    Jhanjhi N.Z.
    Humayun M.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 865 - 879
  • [5] Identification method of dynamic road traffic network vulnerability
    School of Urban Railway Transportation, Soochow University, Suzhou
    Jiangsu
    215006, China
    不详
    Hubei
    430074, China
    Jiaotong Yunshu Gongcheng Xuebao, 5 (74-81):
  • [6] Urban road traffic network vulnerability identification method
    Zhang, Yong
    Tu, Ning-Wen
    Yao, Lin-Quan
    Zhongguo Gonglu Xuebao/China Journal of Highway and Transport, 2013, 26 (04): : 154 - 161
  • [7] A Reduced Network Traffic Method for IoT Data Clustering
    De Azevedo, Ricardo
    Machado, Gabriel Resende
    Goldschmidt, Ronaldo Ribeiro
    Choren, Ricardo
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2021, 15 (01)
  • [8] Data Analytics on Network Traffic Flows for Botnet Behaviour Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [9] CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad
    Tian, Zhihong
    Bashir, Ali Kashif
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05): : 3242 - 3254
  • [10] Intrusion Detection in IoT Network Traffic Using Markov Model
    Liu, I-Hsien
    Huang, Hsiao-Ching
    Lee, Meng-Huan
    Li, Jung-Shian
    SENSORS AND MATERIALS, 2024, 36 (03) : 1127 - 1134