FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks

被引:4
|
作者
de Melo, Pedro H. A. D. [1 ]
Miani, Rodrigo Sanches [1 ]
Rosa, Pedro Frosi [1 ]
机构
[1] Fed Univ Uberlandia UFU, Sch Comp Sci, BR-38400902 Uberlandia, MG, Brazil
关键词
machine learning; anomaly detection; network security; smart home; Internet of things (IoT); SMART HOME; PRESENT STATE; INTERNET; CHALLENGES; THINGS; DDOS; FLOW;
D O I
10.3390/s22082895
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The residential environment is constantly evolving technologically. With this evolution, sensors have become intelligent interconnecting home appliances, personal computers, and mobile devices. Despite the benefits of this interaction, these devices are also prone to security threats and vulnerabilities. Ensuring the security of smart homes is challenging due to the heterogeneity of applications and protocols involved in this environment. This work proposes the FamilyGuard architecture to add a new layer of security and simplify management of the home environment by detecting network traffic anomalies. Experiments are carried out to validate the main components of the architecture. An anomaly detection module is also developed by using machine learning through one-class classifiers based on the network flow. The results show that the proposed solution can offer smart home users additional and personalized security features using low-cost devices.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] A security architecture for attacks detection and authentication in wireless mesh networks
    Sharma, Parveen Kumar
    Mahajan, Rajiv
    Surender
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2323 - 2332
  • [22] An Architecture for Inline Anomaly Detection
    Krueger, Tammo
    Gehl, Christian
    Rieck, Konrad
    Laskov, Pavel
    EC2ND 2008: FOURTH ANNUAL EUROPEAN CONFERENCE ON COMPUTER NETWORK DEFENSE, PROCEEDINGS, 2008, : 11 - 18
  • [23] Federated Learning for Anomaly Detection in Open RAN: Security Architecture Within a Digital Twin
    Rumesh, Yasintha
    Attanayaka, Dinaj
    Porambage, Pawani
    Pinola, Jarno
    Groen, Joshua
    Chowdhury, Kaushik
    2024 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT 2024, 2024, : 877 - 882
  • [24] Future of generative adversarial networks (GAN) for anomaly detection in network security: A review
    Lim, Willone
    Yong, Kelvin Sheng Chek
    Lau, Bee Theng
    Tan, Colin Choon Lin
    COMPUTERS & SECURITY, 2024, 139
  • [25] Security of Networks Using Efficient Adaptive Flow Counting for Anomaly Detection in SDN
    Garg, Gagandeep
    Garg, Roopali
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 667 - 674
  • [26] Simulation of education digital network security and anomaly detection based on neural networks
    Li, Hong
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 112
  • [27] Anomaly detection in cyber security attacks on networks using MLP deep learning
    Teoh, T. T.
    Chiew, Graeme
    Franco, Edwin J.
    Ng, P. C.
    Benjamin, M. P.
    Goh, Y. J.
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [28] Wireless Smart Home Sensor Networks: Mobile Agent based Anomaly Detection
    Usman, Muhammad
    Muthukkumarasamy, Vallipuram
    Wu, Xin-Wen
    Khanum, Surraya
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 322 - 329
  • [29] DDoS prevention architecture using anomaly detection in fog-empowered networks
    Sharma, Deepak Kumar
    Devgan, Manish
    Malik, Gaurav
    Dutt, Prashant
    Goel, Aarti
    Gupta, Deepak
    Al-Turjman, Fadi
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2021, 13 (03) : 201 - 217
  • [30] A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox
    Giotis, Kostas
    Androulidakis, George
    Maglaris, Vasilis
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1958 - 1970