Efficient Approach for Anomaly Detection in IoT Using System Calls
<p>Abstract view of the IoT and system calls (syscalls).</p> "> Figure 2
<p>Block diagram of (<b>a</b>) training and (<b>b</b>) anomaly detection phases of the proposed approach.</p> "> Figure 3
<p>Line plot of syscall sequences taken from three datasets (<b>a</b>–<b>c</b>) and a standard Linux process (<b>d</b>). Each syscall sequence exhibits a repeated pattern of varying length, for example, the UNM Sendmail plot shows that the syscall pattern is repeated after 15 calls, whereas in the UNM-LPR plot, the syscall pattern is repeated after approximately 166 syscalls.</p> "> Figure 4
<p>Block diagram showing the process of finding the start of execution pattern: Steps 1 to 4 show the initial segmentation, step 5 uses these initial segments to find the most common segments, step 6 is the construction of the suffix tree, which returns the sub-sequences common among these initial segments.</p> "> Figure 5
<p>(<b>a</b>–<b>c</b>) show a sample of the UNM-LPR syscall sequence, its autocorrelation, and segmentation, respectively. The dotted red lines in (<b>c</b>,<b>f</b>) show the segmentation boundaries determined using positions of peaks from autocorrelation; (<b>d</b>–<b>f</b>) show the same stages for a noisy UNM-LPR syscall sequence sample, while (<b>g</b>) shows boundaries determined using the SoE pattern shown in red; (<b>g</b>) shows that the SoE pattern provides better segment boundaries for a noisy syscall sequence for which the autocorrelation method did not perform well.</p> "> Figure 6
<p>Markov chain convergence.</p> "> Figure 7
<p>Dataset consistency analysis: Variation in frequency of syscalls of: (<b>a</b>) UNM Sendmail, (<b>b</b>) UNM-LPR, and (<b>c</b>) PiData datasets observed in 10 equal-sized segments. The plot shows the standard deviation in frequencies of three datasets’ syscalls. It can be seen that the frequencies of syscalls in the UNM Sendmail dataset do not vary much in different segments of the dataset, while syscalls in the UNM-LPR dataset show varied syscall frequencies.</p> "> Figure 8
<p>Laboratory setup for emulated denial of service (EDoS) attack on the custom IoT device. The black lines indicate the message settings, the green lines show normal MQTT traffic, and the red lines show the situations during the attack broker, b1, dropping traffic intended for d1 and c1.</p> "> Figure 9
<p>Results of the executing proposed anomaly detection approach over test data of all three datasets.</p> "> Figure 10
<p>Anomaly detection results of PiData dataset, the attack abbreviations are; ED: emulated DoS, CE: code execution.</p> "> Figure 11
<p>Anomaly detection results of UNM Sendmail dataset, the attack abbreviations are; BF: Buffer overflow, PE: Privilege Escalation, CI: Code Injection, FL: Forwarding Loop.</p> "> Figure 12
<p>Anomaly detection results of UNM-LPR dataset.</p> ">
Abstract
:1. Introduction
- We propose a new method to dynamically segment the syscall data into constituent program execution paths. The method is based on the novel idea of treating the syscall sequence as a sequence of program execution paths (Section 4). It finds a start-of-execution pattern for these execution paths and segments the syscall sequence using this pattern. Hence, it presents a solution to the issue of using a fixed segment length, which makes model data specific. Related discussions are in Section 2.1, Section 3.1 and Section 4.1.
- We propose a novel method to address the issue of using a predetermined threshold in probabilistic anomaly detection approaches for the IoT (Section 4). The devised method is based on the idea of presenting syscall segments as paths of a Markov chain. The threshold is dynamically determined using the probabilities and lengths of these paths, Section 2.1 and Section 3.2 provide the related discussion.
- We propose a syscall dataset that consists of long traces of normal activities of a custom IoT device captured under a variety of standard conditions along with multiple attack traces (Section 5.1.2). There are only a few syscall datasets available in this domain, and the proposed dataset can be helpful for further research in this area.
2. Related Work
2.1. Research Gap Analysis
3. Background
3.1. System Calls and Program Execution Path
3.2. Markov Chain
4. Proposed Approach
4.1. Segmentation Mechanism
4.2. Transition Matrix
4.3. Set of Thresholds
4.4. Training Phase
4.5. Anomaly Detection
5. Testing and Evaluation
5.1. Datasets Characteristics
5.1.1. UNM Dataset
5.1.2. Custom Dataset
Normal Execution Conditions
Attack Scenarios
5.2. Evaluation Metrics
6. Results and Comparison
6.1. Computation Cost
6.2. Discussion
7. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations and Notations
5G | fifth generation mobile network |
ACF | autocorrelation function |
CE | code execution |
CNN | convolutional neural network |
DHT | digital humidity and temperature |
DoS | denial-of-service |
DUR | device usage description |
f | anomaly detection function |
FN | false negative |
FP | false positive |
FPR | false positive rate |
GRU | gated recurrent unit |
IDE | integrated development environment |
IF | isolation forest |
Industry 4.0 | fourth industrial revolution |
IoT | Internet of Things |
length of candidate segment | |
LCS | longest common subsequence |
LPR | line printer remote protocol |
LOF | local outlier factor |
LSTM | long short-term memory |
M | transition matrix |
MC | Markov chain |
MQTT | message queuing telemetry transport |
MUD | manufacturer usage description |
Netem | network emulation |
OS | operating system |
probability of candidate segment | |
p | transition probability |
PiData | custom dataset |
RF | random forest |
candidate segment | |
SoE | start of execution |
SVM | support vector machine |
Syscall | system call |
T | set of thresholds |
TN | true negative |
TP | true positive |
TPR | true positive rate |
UNM | The University of New Mexico |
References
- Sodhro, A.H.; Awad, A.I.; van de Beek, J.; Nikolakopoulos, G. Intelligent authentication of 5G healthcare devices: A survey. Internet Things 2022, 20, 100610. [Google Scholar] [CrossRef]
- Ghobakhloo, M. Industry 4.0, digitization, and opportunities for sustainability. J. Clean. Prod. 2020, 252, 119869. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Nawaz, M.H.; Ulusar, U.D. Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. Comput. Commun. 2020, 150, 644–660. [Google Scholar] [CrossRef]
- Mamdouh, M.; Awad, A.I.; Khalaf, A.A.; Hamed, H.F. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. Comput. Secur. 2021, 111, 102491. [Google Scholar] [CrossRef]
- Arasteh, H.; Hosseinnezhad, V.; Loia, V.; Tommasetti, A.; Troisi, O.; Shafie-khah, M.; Siano, P. Iot-based smart cities: A survey. In Proceedings of the 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), Florence, Italy, 7–10 June 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Muthuramalingam, S.; Bharathi, A.; Gayathri, N.; Sathiyaraj, R.; Balamurugan, B. IoT based intelligent transportation system (IoT-ITS) for global perspective: A case study. In Internet of Things and Big Data Analytics for Smart Generation; Springer: Berlin/Heidelberg, Germany, 2019; pp. 279–300. [Google Scholar]
- Civerchia, F.; Bocchino, S.; Salvadori, C.; Rossi, E.; Maggiani, L.; Petracca, M. Industrial Internet of Things monitoring solution for advanced predictive maintenance applications. J. Ind. Inf. Integr. 2017, 7, 4–12. [Google Scholar] [CrossRef]
- Collela, P. Ushering in a Better Connected Future. Available online: https://www.ericsson.com/en/about-us/company-facts/ericsson-worldwide/india/authored-articles/ushering-in-a-better-connected-future (accessed on 23 May 2022).
- Hassan, M. State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally. Available online: https://iot-analytics.com/number-connected-iot-devices/ (accessed on 23 May 2022).
- Marr, B. The 5 Biggest Internet of Things (IoT) Trends in 2022. Available online: https://www.forbes.com/sites/bernardmarr/2021/12/13/the-5-biggest-internet-of-things-iot-trends-in-2022/?sh=568730785aba (accessed on 23 May 2022).
- Vailshery, L.S. Internet of Things (IoT)-Statistics and Facts. 2021. Available online: https://www.statista.com/topics/2637/internet-of-things (accessed on 2 June 2022).
- Awad, A.I.; Abawajy, J. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, 1st ed.; John Wiley & Sons: New Jersey, NJ, USA, 2021. [Google Scholar]
- Dave. Las Vegas Casino Hacked via Fish Tank. Available online: https://www.casinous.com/las-vegas-casino-hacked-via-fish-tank/ (accessed on 26 May 2022).
- Chiu, A. Ring Camera Hacker Harasses Mississippi 8-Year-Old in Her Bedroom—The Washington Post. Available online: https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/ (accessed on 26 May 2022).
- Point, C. Faxploit: Breaking the Unthinkable. Available online: https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/ (accessed on 26 May 2022).
- Schiller, E.; Aidoo, A.; Fuhrer, J.; Stahl, J.; Ziörjen, M.; Stiller, B. Landscape of IoT security. Comput. Sci. Rev. 2022, 44, 100467. [Google Scholar] [CrossRef]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Bertino, E.; Islam, N. Botnets and internet of things security. Computer 2017, 50, 76–79. [Google Scholar] [CrossRef]
- Ali, B.; Awad, A.I. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors 2018, 18, 817. [Google Scholar] [CrossRef] [Green Version]
- Hassaballah, M.; Hameed, M.A.; Awad, A.I.; Muhammad, K. A Novel Image Steganography Method for Industrial Internet of Things Security. IEEE Trans. Ind. Inform. 2021, 17, 7743–7751. [Google Scholar] [CrossRef]
- Cook, A.A.; Mısırlı, G.; Fan, Z. Anomaly detection for IoT time-series data: A survey. IEEE Internet Things J. 2019, 7, 6481–6494. [Google Scholar] [CrossRef]
- Patcha, A.; Park, J.M. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 2007, 51, 3448–3470. [Google Scholar] [CrossRef]
- Behniafar, M.; Nowroozi, A.; Shahriari, H.R. A survey of anomaly detection approaches in internet of things. ISeCure 2018, 10, 79–92. [Google Scholar]
- Keniston, J.; Mavinakayanahalli, A.; Panchamukhi, P.; Prasad, V. Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps. In Proceedings of the 2007 Linux Symposium, Ottawa, ON, Canada, 27–30 June 2007; pp. 215–224. [Google Scholar]
- Hubballi, N.; Biswas, S.; Nandi, S. Sequencegram: N-gram modeling of system calls for program based anomaly detection. In Proceedings of the 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, India, 4–8 January 2011; pp. 1–10. [Google Scholar] [CrossRef]
- Sivanathan, A.; Sherratt, D.; Gharakheili, H.H.; Sivaraman, V.; Vishwanath, A. Low-cost flow-based security solutions for smart-home IoT devices. In Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bangalore, India, 6–9 November 2016; pp. 1–6. [Google Scholar]
- Sivanathan, A.; Gharakheili, H.H.; Sivaraman, V. Detecting behavioral change of IoT devices using clustering-based network traffic modeling. IEEE Internet Things J. 2020, 7, 7295–7309. [Google Scholar] [CrossRef]
- Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 2020, 7, 6882–6897. [Google Scholar] [CrossRef]
- Maniriho, P.; Niyigaba, E.; Bizimana, Z.; Twiringiyimana, V.; Mahoro, L.J.; Ahmad, T. Anomaly-based intrusion detection approach for IoT networks using machine learning. In Proceedings of the 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), Surabaya, Indonesia, 17–18 November 2020; pp. 303–308. [Google Scholar]
- Mirsky, Y.; Golomb, T.; Elovici, Y. Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distrib. Comput. 2020, 145, 75–97. [Google Scholar] [CrossRef]
- Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.R. DÏoT: A federated self-learning anomaly detection system for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar]
- Wang, J.; Hao, S.; Wen, R.; Zhang, B.; Zhang, L.; Hu, H.; Lu, R. IoT-praetor: Undesired behaviors detection for IoT devices. IEEE Internet Things J. 2020, 8, 927–940. [Google Scholar] [CrossRef]
- Lear, E.; Droms, R.; Romascanu, D. RFC 8520: Manufacturer Usage Description Specification; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2019. [Google Scholar] [CrossRef]
- Hoy, M.B. If this then that: An introduction to automated task services. Med. Ref. Serv. Q. 2015, 34, 98–103. [Google Scholar] [CrossRef]
- Proctor, M. Drools: A rule engine for complex event processing. In Proceedings of the International Symposium on Applications of Graph Transformations with Industrial Relevance, Budapest, Hungary, 4–7 October 2011; p. 2. [Google Scholar]
- Sharma, V.; You, I.; Yim, K.; Chen, R.; Cho, J.H. BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 2019, 7, 118556–118580. [Google Scholar] [CrossRef]
- Forrest, S.; Hofmeyr, S.A.; Somayaji, A.; Longstaff, T.A. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 6–8 May 1996; pp. 120–128. [Google Scholar]
- Hofmeyr, S.A.; Forrest, S.; Somayaji, A. Intrusion detection using sequences of system calls. J. Comput. Secur. 1998, 6, 151–180. [Google Scholar] [CrossRef]
- Eskin, E.; Lee, W.; Stolfo, S.J. Modeling system calls for intrusion detection with dynamic window sizes. In Proceedings of the DARPA Information Survivability Conference and Exposition II. DISCEX’01, Anaheim, CA, USA, 12–14 June 2001; Volume 1, pp. 165–175. [Google Scholar]
- Hoang, D.K.; Vu, D.L. IoT Malware Classification Based on System Calls. In Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), Ho Chi Minh, Vietnam, 14–15 October 2020; pp. 1–6. [Google Scholar]
- Liao, X.; Wang, C.; Chen, W. Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM. Secur. Commun. Netw. 2022, 2022, 6401316. [Google Scholar] [CrossRef]
- Shobana, M.; Poonkuzhali, S. A novel approach to detect IoT malware by system calls using Deep learning techniques. In Proceedings of the 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), Kottayam, India, 13–14 February 2020; pp. 1–5. [Google Scholar]
- Liu, Z.; Japkowicz, N.; Wang, R.; Cai, Y.; Tang, D.; Cai, X. A statistical pattern based feature extraction method on system call traces for anomaly detection. Inf. Softw. Technol. 2020, 126, 106348. [Google Scholar] [CrossRef]
- Zhang, Y.; Luo, S.; Pan, L.; Zhang, H. Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. Future Gener. Comput. Syst. 2021, 125, 112–126. [Google Scholar] [CrossRef]
- Breitenbacher, D.; Homoliak, I.; Aung, Y.L.; Tippenhauer, N.O.; Elovici, Y. HADES-IoT: A practical host-based anomaly detection system for IoT devices. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 9–12 July 2019; pp. 479–484. [Google Scholar]
- Carter, J.; Mancoridis, S.; Galinkin, E. Fast, lightweight IoT anomaly detection using feature pruning and PCA. In Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, 25–29 April 2022; pp. 133–138. [Google Scholar]
- Sivanathan, A.; Sherratt, D.; Gharakheili, H.H.; Radford, A.; Wijenayake, C.; Vishwanath, A.; Sivaraman, V. Characterizing and classifying IoT traffic in smart cities and campuses. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 559–564. [Google Scholar]
- Ngoc, T.N.; The, D.L.; Nghi, P.T. A Novel Approach to Detect IoT Malware by System Calls and Long Short-Term Memory Model. J. Theor. Appl. Inf. Technol. 2021, 99, 469–480. [Google Scholar]
- Grimmer, M.; Röhling, M.M.; Kricke, M.; Franczyk, B.; Rahm, E. Intrusion detection on system call graphs. In Proceedings of the 25th DFN-Konferenz, Sicherheit in vernetzten Systemen, Hamburg, Germany, 27–28 February 2018; pp. G1–G18. [Google Scholar]
- Khan, M.T.; Serpanos, D.; Shrobe, H. A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 100–105. [Google Scholar]
- Ye, N.; Zhang, Y.; Borror, C.M. Robustness of the Markov-chain model for cyber-attack detection. IEEE Trans. Reliab. 2004, 53, 116–123. [Google Scholar] [CrossRef]
- Ye, N. A markov chain model of temporal behavior for anomaly detection. In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, USA, 6 June 2000; Volume 166, p. 169. [Google Scholar]
- Schafer, R.W. What is a Savitzky-Golay filter? [lecture notes]. IEEE Signal Process. Mag. 2011, 28, 111–117. [Google Scholar] [CrossRef]
- Ozcan, G.; Alpkocak, A. Online Suffix Tree Construction for Streaming Sequences. In Proceedings of the Computer Society of Iran Computer Conference, 2008, Kish Island, Iran, 9–11 July 2008; Springer: Berlin/Heidelberg, Germany; pp. 69–81. [Google Scholar]
- HIDS/Datasets/UNM. Available online: https://github.com/anandsagarthumati9848/HIDS/tree/main/Datasets/UNM (accessed on 10 December 2022).
- Warrender, C.; Forrest, S.; Pearlmutter, B. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344), Oakland, CA, USA, 9–12 May 1999; pp. 133–145. [Google Scholar]
- Soni, D.; Makwana, A. A survey on MQTT: A protocol of internet of things (IoT). In Proceedings of the International Conference on Telecommunication, Power Analysis and Computing Techniques (ICTPACT-2017), Chennai, India, 6–8 April 2017; Volume 20, pp. 173–177. [Google Scholar]
- Eclipse Mosquitto. Available online: https://mosquitto.org/ (accessed on 22 September 2022).
- Zhang, X.; Wu, S.F.; Fu, Z.; Wu, T.L. Malicious packet dropping: How it might impact the TCP performance and how we can detect it. In Proceedings of the 2000 International Conference on Network Protocols, Osaka, Japan, 14–17 November 2000; pp. 263–272. [Google Scholar]
- Jurgelionis, A.; Laulajainen, J.P.; Hirvonen, M.; Wang, A.I. An empirical study of netem network emulation functionalities. In Proceedings of the 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, HI, USA, 31 July–4 August 2011; pp. 1–6. [Google Scholar]
- Robitaille, T. GitHub—Astrofrog/Psrecord: Record the CPU and Memory Activity of a Process. Available online: https://github.com/astrofrog/psrecord (accessed on 9 December 2022).
Article | Approach | Method | Dataset |
---|---|---|---|
Sivanathan et al. [26] | IoT network flow analysis | Model checking | Custom |
Sivanathan et al. [27] | Network packet analysis | Classification, K-Means | Custom |
Eskandari et al. [28] | Network flow analysis | Classification, LOF & IF | Custom |
Maniriho et al. [29] | Network traffic analysis | Classification, RF | IoTID20 |
Mirsky et al. [30] | Memory jump sequence analysis | Markov Chain | Real Data |
Nguyen et al. [31] | Federated Learning | Classification, GRU | Custom |
Wang et al. [32] | Device usage rules analysis | Custom framework | From [47] |
Sharma et al. [36] | Specification analysis | Formal Verification | None |
Forrest et al. [37] | Syscall sequence analysis | Sequence matching | Custom |
Toan et al. [48] | Syscall sequence analysis | Classification, LSTM | Custom |
Liao et al. [41] | Syscall sequence analysis | Classification, SVM | UNM |
Shobana et al. [42] | Syscall n-gram analysis | Classification, LSTM | Custom |
Hoang et al. [40] | Syscall n-gram analysis | Classification, SVM | Custom |
Liu, Z et al. [43] | Syscall statistical pattern analysis | IF, LOF, KNN, SVM | ADFA |
Zhang, Y. et al [44] | Syscall behavioral semantics | Classification, TextCNN | ADFA-LD |
Breitenbacher et al. [45] | Process whitelisting | Hash tables, SHA256 | Real Devices |
Carter, J et al. [46] | Feature engineering | Feature pruning, PCA | Custom |
Normal Data | Attack Data | ||||
---|---|---|---|---|---|
Dataset | Traces | Instructions | Attack Description | Traces | |
Privilege Escalation | 03 | ||||
UNM Sendmail-decode | 02 | ||||
Forwarding Loops | 05 | ||||
PiData (Custom) | 05 | 1,322,032 | Emulated DoS | 02 | |
Code Execution | 02 | ||||
UNM-LPR | 4500 | 2,027,468 | Code Injection | 1000 | |
MIT-LPR | 2700 | 2,926,304 | Code Injection | 1000 | |
Total 4 | 7211 | 7,847,387 | 7 different attacks | 1018 |
Feature | Value |
---|---|
Raspberry Pi model | 4B |
Raspberry Pi memory | 4 GB |
Messaging protocol | MQTT 5.0 |
Temperature and humidity sensor | DHT11 |
Server/Broker | Eclipse Mosquitto [58] |
Programming language | Python 3 |
Parameter | CIoTA [30] | IMD-SLSTM [48] | ADSC-DFRS [41] | Proposed |
---|---|---|---|---|
Domain | IoT | IoT | Generic | IoT |
Anomaly Detection | Y | N | Y | Y |
Syscall Based | N | Y | Y | Y |
Dataset | Custom | Custom | UNM, ADFA-LD | Y |
Threshold | Fixed | Dynamic | Dynamic | Dynamic |
Segmentation | None | Fixed | Mixed | Dynamic |
Sequence-Based | Y | Y | Y | Y |
Markov chain | Y | N | N | Y |
Approach | Year | Accuracy | Score | FPR | |||
---|---|---|---|---|---|---|---|
Max | Min | Max | Min | Max | Min | ||
CIoTA [30] | 2019 | 96.9 | 91.60 | - | - | 2.14 | 0.0 |
IMD-SLSTM [48] | 2021 | 98.37 | - | 98.38 | - | - | - |
ADSC-DFRS [41] | 2022 | 99.00 | - | 93.00 | - | 2.40 | - |
Proposed | 2022 | 100.00 | 99.87 | 100.00 | 99.86 | 0.86 | 0.0 |
Device | Data | Execution | CPU (%) | Memory | Time (s) | Total | Time/TS (s) |
---|---|---|---|---|---|---|---|
Scenario | (MB) | Segments (TS) | |||||
Custom IoT | Test | Standalone | 28.43 | 37.86 | 16.91 | 2006 | 0.008 |
Custom IoT | Test | Using IDE | 24.9 | 16.8 | 13.12 | 2006 | 0.006 |
Custom IoT | Attack | Standalone | 22.25 | 20.5 | 2.23 | 410 | 0.005 |
Custom IoT | Attack | Using IDE | 6.55 | 12.8 | 9.2 | 410 | 0.022 |
Laptop | Test | Standalone | 31.46 | 14.8 | 0.98 | 2006 | 0.002 |
Laptop | Test | Using IDE | 23.2 | 20.25 | 0.33 | 2006 | 0.0001 |
Laptop | Attack | Standalone | 30.49 | 5.02 | 0.73 | 410 | 0.001 |
Laptop | Attack | Using IDE | 1.45 | 17.2 | 0.23 | 410 | 0.0005 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shamim, N.; Asim, M.; Baker, T.; Awad, A.I. Efficient Approach for Anomaly Detection in IoT Using System Calls. Sensors 2023, 23, 652. https://doi.org/10.3390/s23020652
Shamim N, Asim M, Baker T, Awad AI. Efficient Approach for Anomaly Detection in IoT Using System Calls. Sensors. 2023; 23(2):652. https://doi.org/10.3390/s23020652
Chicago/Turabian StyleShamim, Nouman, Muhammad Asim, Thar Baker, and Ali Ismail Awad. 2023. "Efficient Approach for Anomaly Detection in IoT Using System Calls" Sensors 23, no. 2: 652. https://doi.org/10.3390/s23020652
APA StyleShamim, N., Asim, M., Baker, T., & Awad, A. I. (2023). Efficient Approach for Anomaly Detection in IoT Using System Calls. Sensors, 23(2), 652. https://doi.org/10.3390/s23020652