Anomaly Detection for Smart Home Based on User Behavior

被引:15
|
作者
Yamauchi, Masaaki [1 ]
Ohsita, Yuichi [1 ]
Murata, Masayuki [1 ]
Ueda, Kensuke [2 ]
Kato, Yoshiaki [3 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
[2] Mitsubishi Electr Corp, Adv Technol R&D Ctr, Tokyo, Japan
[3] Mitsubishi Electr Corp, Informat Technol R&D Ctr, Tokyo, Japan
关键词
Anomaly Detection; IoT; Security; Smart Home; Behavior Pattern; Operation by Attackers; Consumer Electronics; CHALLENGES; INTERNET; THINGS;
D O I
10.1109/icce.2019.8661976
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many devices, such as air conditioners and refrigerators, are now being connected to the Internet and, as a consequence, have become targets of cyberattacks. Especially, the operations by attackers can cause serious problems, which may harm users. However, such attacks are difficult to detect because they use the same protocol as legitimate operations by users. In this paper, we propose a method to detect such attacks based on user behavior. We model user behavior as a sequence of events, which includes the operation of IoT devices and other behavior monitored by any sensors. Our method learns sequences of events for each one of a predefined set of conditions and detects attacks by comparing the sequences of the events including the current operation with the learned sequences. We evaluate our method by using data collected by monitoring the behavior of four users. Based on the results of this evaluation, we demonstrate the accuracy of our method and discuss the limitations of our method.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [1] Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions
    Yamauchi, Masaaki
    Ohsita, Yuichi
    Murata, Masayuki
    Ueda, Kensuke
    Kato, Yoshiaki
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2020, 66 (02) : 183 - 192
  • [2] Behavior-based Anomaly Detection for Securing Smart Home Systems Automation
    Amraoui, Noureddine
    Zouari, Belhassen
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 373 - 378
  • [3] User behavior recognition based on clustering for the smart home
    Chung, Wooyong
    Lee, Jaehun
    Yun, Sukhyun
    Kim, Soohan
    Kim, Euntai
    CHALLENGES IN REMOTE SENSING: PROCEEDINGS OF THE 3RD WSEAS INTERNATIONAL CONFERENCE ON REMOTE SENSING (REMOTE '07), 2007, : 52 - +
  • [4] Anomaly Detection Models for Smart Home Security
    Ramapatruni, Sowmya
    Narayanan, Sandeep Nair
    Mittal, Sudip
    Joshi, Anupam
    Joshi, Karuna
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 19 - 24
  • [5] An anomaly detection model of user behavior based on similarity clustering
    Hu, Shuai
    Xiao, Zhihua
    Rao, Qiang
    Liao, Rongtao
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 835 - 838
  • [6] Improving Network-Based Anomaly Detection in Smart Home Environment
    Li, Xiaonan
    Ghodosi, Hossein
    Chen, Chao
    Sankupellay, Mangalam
    Lee, Ickjai
    SENSORS, 2022, 22 (15)
  • [7] Smart Home User's Behavior Prediction
    Vavilov, Dmitry
    Melezhik, Alexey
    Platonov, Ivan
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2013,
  • [8] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [9] Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection
    D'Angelo, Andrew
    Fu, Chenglong
    Du, Xiaojiang
    Ratazzi, Paul
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 281 - 289
  • [10] Wireless Smart Home Sensor Networks: Mobile Agent based Anomaly Detection
    Usman, Muhammad
    Muthukkumarasamy, Vallipuram
    Wu, Xin-Wen
    Khanum, Surraya
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 322 - 329