Lumen: A Framework for Developing and Evaluating ML-Based IoT Network Anomaly Detection

被引:4
|
作者
Sharma, Rahul Anand [1 ]
Sabane, Ishan [2 ]
Apostolaki, Maria [1 ,3 ]
Rowe, Anthony [1 ]
Sekar, Vyas [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IIT Madra, Madras, Tamil Nadu, India
[3] Princeton Univ, Princeton, NJ USA
关键词
ATTACKS;
D O I
10.1145/3555050.3569129
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of IoT devices brings a lot of security risks. To mitigate them, researchers have introduced various promising networkbased anomaly detection algorithms, which oftentimes leverage machine learning. Unfortunately, though, their deployment and further improvement by network operators and the research community are hampered. We believe this is due to three key reasons. First, known ML-based anomaly detection algorithms are evaluated -in the best case- on a couple of publicly available datasets, making it hard to compare across algorithms. Second, each ML-based IoT anomaly-detection algorithm makes assumptions about attacker practices/classification granularity, which reduce their applicability. Finally, the implementation of those algorithms is often monolithic, prohibiting code reuse. To ease deployment and promote research in this area, we present Lumen. Lumen is a modular framework paired with a benchmarking suite that allows users to efficiently develop, evaluate, and compare IoT ML-based anomaly detection algorithms. We demonstrate the utility of Lumen by implementing state-of-the-art anomaly detection algorithms and faithfully evaluating them on various datasets. Among other interesting insights that could inform real-world deployments and future research, using Lumen, we were able to identify what algorithms are most suitable to detect particular types of attacks. Lumen can also be used to construct new algorithms with better performance by combining the building blocks of competing efforts and improving the training setup.
引用
收藏
页码:59 / 71
页数:13
相关论文
共 50 条
  • [1] Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Anwar, Afsah
    Alshamrani, Sultan
    Alabduljabbar, Abdulrahman
    Jang, Rhongho
    Nyang, DaeHun
    Mohaisen, David
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 308 - 320
  • [2] ML-Based Early Detection of IoT Botnets
    Kumar, Ayush
    Shridhar, Mrinalini
    Swaminathan, Sahithya
    Lim, Teng Joon
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 254 - 260
  • [3] OMINACS: Online ML-Based IoT Network Attack Detection and Classification System
    Abreu, Diego
    Abelem, Antonio
    2022 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2022,
  • [4] Evaluating ML-based anomaly detection across datasets of varied integrity: A case study
    Pekar, Adrian
    Jozsa, Richard
    COMPUTER NETWORKS, 2024, 251
  • [5] Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
    Abusnaina, Ahmed
    Anwar, Afsah
    Alshamrani, Sultan
    Alabduljabbar, Abdulrahman
    Jang, Rhongho
    Nyang, Daehun
    Mohaisen, David
    51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOL (DSN 2021), 2021, : 3 - 4
  • [6] Adversarial Analysis of ML-Based Anomaly Detection in Multi-Layer Network Automation
    Pan, Xiaoqin
    Yang, Hao
    Xu, Zichen
    Zhu, Zuqing
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2022, 40 (15) : 4934 - 4944
  • [7] Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
    Mirzai, Aria
    Coban, Ali Zulfukar
    Almgren, Magnus
    Aoudi, Wissam
    Bertilsson, Tobias
    PROCEEDINGS OF THE 2023 EUROPEAN WORKSHOP ON SYSTEM SECURITY, EUROSEC 2023, 2023, : 44 - 50
  • [8] An Intelligent IoT and ML-Based Water Leakage Detection System
    Islam, Mohammed Rezwanul
    Azam, Sami
    Shanmugam, Bharanidharan
    Mathur, Deepika
    IEEE ACCESS, 2023, 11 : 123625 - 123649
  • [9] A ML-Based Model for Evaluating the Power Consumption of Network Devices
    Hsu, Chi-Sheng
    Chu, Yi-Cheng
    Huang, Ya-Ping
    Huang, Lung-Chin
    Teng, Che-Chun
    Chuang, Chin-Ping
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [10] Data Cleansing With Minimum Distortion for ML-Based Equipment Anomaly Detection
    Hsieh, Yun-Che
    Chen, Chieh-Yu
    Liao, Da-Yin
    Lin, Kuan-Chun
    Chang, Shi-Chung
    IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, 2023, 36 (04) : 506 - 514