Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach

被引:0
|
作者
Paudel, Ramesh [1 ]
Muncy, Timothy [2 ]
Eberle, William [1 ]
机构
[1] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[2] East Tennessee State Univ, Dept Comp, Johnson City, TN USA
基金
美国国家科学基金会;
关键词
IoT Security; Smart Home; DoS Attack Detection; Graph Mining; Anomaly Detection; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of the Internet of Things (IoT) devices has surged in recent years. However, due to the lack of substantial security, IoT devices are vulnerable to cyber-attacks like Denial-of-Service (DoS) attacks. Most of the current security solutions are either computationally expensive or unscalable as they require known attack signatures or full packet inspection. In this paper, we introduce a novel Graph-based Outlier Detection in Internet of Things (GODIT) approach that (i) represents smart home IoT traffic as a real-time graph stream, (ii) efficiently processes graph data, and (iii) detects DoS attack in real-time. The experimental results on real-world data collected from IoT-equipped smart home show that GODIT is more effective than the traditional machine learning approaches, and is able to outperform current graph-stream anomaly detection approaches.
引用
收藏
页码:5249 / 5258
页数:10
相关论文
共 50 条
  • [1] Validating GrADAR - an Approach for Graph-based Automated DoS Attack Response
    Jahnke, Marko
    Toelle, Jens
    Thul, Christian
    Martini, Peter
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 225 - +
  • [2] Enhancing Graph-based Automated DoS Attack Response
    Klein, Gabriel
    Jahnke, Marko
    Toelle, Jens
    Martini, Peter
    [J]. THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 249 - +
  • [3] A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT
    Jia, Yizhen
    Xiao, Yinhao
    Yu, Jiguo
    Cheng, Xiuzhen
    Liang, Zhenkai
    Wan, Zhiguo
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1493 - 1501
  • [4] Detecting Suspicious Behavior Using a Graph-Based Approach
    Mookiah, Lenin
    Eberle, William
    Holder, Lawrence
    [J]. 2014 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2014, : 357 - 358
  • [5] Detecting Vehicular Patterns Using a Graph-Based Approach
    Velampalli, Sirisha
    Mookiah, Lenin
    Eberle, William
    [J]. 2017 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2017, : 209 - 210
  • [6] A Graph-based Approach to Detect DoB Attack
    Thomas, Diya
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 422 - 423
  • [7] Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction
    Choi, Jiwon
    Jeoung, Hayoung
    Kim, Jihun
    Ko, Youngjoo
    Jung, Wonup
    Kim, Hanjun
    Kim, Jong
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 610 - 621
  • [8] Detecting Spam Tweets in Trending Topics Using Graph-Based Approach
    Paudel, Ramesh
    Kandel, Prajjwal
    Eberle, William
    [J]. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 526 - 546
  • [9] Detecting and Mitigating MitM Attack on IoT Devices Using SDN
    Aoueileyine, Mohamed Ould-Elhassen
    Karmous, Neder
    Bouallegue, Ridha
    Youssef, Neji
    Yazidi, Anis
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024, 2024, 204 : 320 - 330
  • [10] A novel graph-based approach for IoT botnet detection
    Huy-Trung Nguyen
    Quoc-Dung Ngo
    Van-Hoang Le
    [J]. International Journal of Information Security, 2020, 19 : 567 - 577