Identifying Anomaly in IoT Traffic Flow With Locality Sensitive Hashes

被引:0
|
作者
Charyyev, Batyr [1 ]
Hadi Gunes, Mehmet [2 ]
机构
[1] Univ Nevada, Comp Sci & Engn Dept, Reno, NV 89557 USA
[2] Akamai, Boston, MA 02142 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Feature extraction; Telecommunication traffic; Training; Object recognition; Data models; Performance evaluation; networking; traffic fingerprinting;
D O I
10.1109/ACCESS.2024.3420238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices introduce new vulnerabilities to the network. These devices are relatively cheap, have simple design yet they can collect private user data, and be employed as botnets to conduct large-scale attacks. In general, IoT devices have a limited set of functionalities. Thus, the network administrator can formulate the expected traffic patterns of the devices and employ the network traffic to detect malicious activities. Existing systems to detect anomaly in IoT traffic mainly use machine learning. Thus, they require tuning the parameters of models and selecting/extracting a representative set of features from the network traffic data. In this paper, we introduce a novel approach Locality Sensitive Anomaly Detection and Identification (LSADI) to detect anomaly in IoT network traffic based on the locality-sensitive hash of the traffic flow. The proposed approach does not require feature selection/extraction from the data and does not have complex set of parameters that need to be tuned. Evaluation with three datasets containing 25 attacks shows that LSADI can detect and identify the type of anomalous flows with an accuracy above 90% on average and performs equally well compared to the state-of-the-art machine learning-based methods.
引用
收藏
页码:89467 / 89478
页数:12
相关论文
共 50 条
  • [41] A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive Hashing
    Hernandez-Jaimes, Mireya Lucia
    Martinez-Cruz, Alfonso
    Ramirez-Gutierrez, Kelseyalejandra
    INTEGRATION-THE VLSI JOURNAL, 2024, 96
  • [42] Anomaly detection based on Nearest Neighbor search with Locality-Sensitive B-tree
    Shen, Maying
    Jiang, Xinghao
    Sun, Tanfeng
    NEUROCOMPUTING, 2018, 289 : 55 - 67
  • [43] Identifying IoT devices and events based on packet length from encrypted traffic
    Pinheiro, Antonio J.
    Bezerra, Jeandro de M.
    Burgardt, Caio A. P.
    Campelo, Divanilson R.
    COMPUTER COMMUNICATIONS, 2019, 144 : 8 - 17
  • [44] Identifying functional urban regions within traffic flow
    Manley, Ed
    REGIONAL STUDIES REGIONAL SCIENCE, 2014, 1 (01): : 40 - 42
  • [46] Identifying anomalous traffic sources using flow statistics
    Kawahara, Ryoichi
    Kamiyama, Noriaki
    Harada, Shigeaki
    Hasegawa, Haruhisa
    Asano, Shoichiro
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [47] Identifying Encrypted Malware Traffic with Contextual Flow Data
    Anderson, Blake
    McGrew, David
    AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 35 - 46
  • [48] Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic
    Yin F.
    Yang L.
    Ma J.
    Zhou Y.
    Wang Y.
    Dai J.
    Security and Communication Networks, 2021, 2021
  • [49] A Traffic Anomaly Detection Method Using Traffic Flow Vectors During Heavy Rainfall
    Hirata, Kensuke
    Kawasaki, Yosuke
    Yoshida, Takahiro
    INTERNATIONAL JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS RESEARCH, 2024, : 91 - 103
  • [50] Identifying online traffic based on property of TCP flow
    HONG, Min-huo
    GU, Ren-tao
    WANG, Hong-xiang
    SUN, Yong-mei
    JI, Yue-feng
    Journal of China Universities of Posts and Telecommunications, 2009, 16 (03): : 84 - 88