首页> 外文期刊>IEEE transactions on network and service management >IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge
【24h】

IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge

机译:IoT-KEEPER:使用边缘的在线流量分析检测恶意物联网网络活动

获取原文
获取原文并翻译 | 示例

摘要

IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IoT-Keeper, a lightweight system which secures the communication of IoT. IoT-Keeper uses our proposed anomaly detection technique to perform traffic analysis at edge gateways. It uses a combination of fuzzy C-means clustering and fuzzy interpolation scheme to analyze network traffic and detect malicious network activity. Once malicious activity is detected, IoT-Keeper automatically enforces network access restrictions against IoT device generating this activity, and prevents it from attacking other devices or services. We have evaluated IoT-Keeper using a comprehensive dataset, collected from a real-world testbed, containing popular IoT devices. Using this dataset, our proposed technique achieved high accuracy (approximate to 0.98) and low false positive rate (approximate to 0.02) for detecting malicious network activity. Our evaluation also shows that IoT-Keeper has low resource footprint, and it can detect and mitigate various network attacks-without requiring explicit attack signatures or sophisticated hardware.
机译:众所周知,物联网设备容易受到攻击,甚至容易受到攻击。此外,物联网设备的资源限制和异构性使得使用传统的端点和网络安全解决方案保护物联网安装变得不切实际。为了解决这个问题,我们提出了IoT-Keeper,这是一种轻量级的系统,可以保护IoT的通信。 IoT-Keeper使用我们提出的异常检测技术在边缘网关执行流量分析。它结合使用模糊C均值聚类和模糊插值方案来分析网络流量并检测恶意网络活动。一旦检测到恶意活动,IoT-Keeper会自动针对生成此活动的IoT设备强制实施网络访问限制,并防止其攻击其他设备或服务。我们已经使用从真实的测试平台收集的,包含流行的IoT设备的综合数据集对IoT-Keeper进行了评估。使用该数据集,我们提出的技术可实现检测恶意网络活动的高精度(约0.98)和低误报率(约0.02)。我们的评估还表明,IoT-Keeper具有较低的资源占用量,并且可以检测和缓解各种网络攻击,而无需明确的攻击特征或复杂的硬件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号