Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security

被引:0
|
作者
Costa, Gianni [1 ]
Forestiero, Agostino [1 ]
Ortale, Riccardo [1 ]
机构
[1] CNR, Inst High Performance Comp & Networking, I-87036 Arcavacata Di Rende, Italy
关键词
Anomaly detection; behavioral patterns; explainable machine learning; Internet of Things; NETWORKS; INTERNET; SYSTEMS; THINGS;
D O I
10.1109/TSC.2023.3327822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The behavioral analysis of smart devices plays a key role in enforcing security for IoT environments. In particular, anomalous patterns can be targeted in the behavior of smart devices as potential IoT cybersecurity threats. In this article, an explainable machine-learning approach is proposed for dealing with behavioral anomalies. Essentially, a rule-based classifier is inferred from the observed behavior of smart devices, to detect and explain patterns of behavioral anomalies. Predictive association modeling is adopted in the formulation of the classifier, to achieve superior effectiveness in detecting behavioral patterns and ensuring clear explanations of both these latter and their classifications. Moreover, the specifically-conceived design of the classifier reduces the number of tunable parameters to one. An extensive empirical evaluation is comparatively carried out on real-world benchmark data. The experimental results reveal the effectiveness, robustness, and scalability of the proposed approach.
引用
收藏
页码:4514 / 4525
页数:12
相关论文
共 50 条
  • [1] RULE-BASED APPROACH FOR DETECTION OF DEFECTS IN MICROLITHOGRAPHY PATTERNS
    GHARPURE, DC
    DAVID, SK
    [J]. MICROELECTRONIC ENGINEERING, 1994, 23 (1-4) : 411 - 414
  • [2] Rule-based detection of design patterns in program code
    Alnusair, Awny
    Zhao, Tian
    Yan, Gongjun
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2014, 16 (03) : 315 - 334
  • [3] Rule-based detection of design patterns in program code
    Awny Alnusair
    Tian Zhao
    Gongjun Yan
    [J]. International Journal on Software Tools for Technology Transfer, 2014, 16 : 315 - 334
  • [4] A rule-based security auditing tool for software vulnerability detection
    Lee, Moohun
    Cho, Sunghoon
    Jang, Changbok
    Park, Heeyong
    Choi, Euiin
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 505 - 512
  • [5] Rule-based detection technique for ICMPv6 anomalous behaviour
    Redhwan M. A. Saad
    Mohammed Anbar
    Selvakumar Manickam
    [J]. Neural Computing and Applications, 2018, 30 : 3815 - 3824
  • [6] Rule-based detection technique for ICMPv6 anomalous behaviour
    Saad, Redhwan M. A.
    Anbar, Mohammed
    Manickam, Selvakumar
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 30 (12): : 3815 - 3824
  • [7] Towards Rule-Based Detection of Design Patterns in Model Transformations
    Mokaddem, Chihab Eddine
    Sahraoui, Houari
    Syriani, Eugene
    [J]. SYSTEM ANALYSIS AND MODELING: TECHNOLOGY-SPECIFIC ASPECTS OF MODELS, 2016, 9959 : 211 - 225
  • [8] Rule-based systems security model
    Smirnov, M
    [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 135 - 146
  • [9] Seamless Reconfiguration of Rule-based IoT Applications
    Duran, Francisco
    Krishna, Ajay
    Le Pallec, Michel
    Mateescu, Radu
    Salaun, Gwen
    [J]. 2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021), 2021, : 142 - 148
  • [10] Survey of IoT Device Security Detection
    Zhang, Yan
    Li, Jiatong
    Song, Xiaoyi
    Fan, Yuting
    Lu, Yemian
    Zhang, Ruoding
    Wang, Zixin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2271 - 2290