Abstract
Recently, Internet of Things (IoT) are spreading and various things are connected to the Internet. As the results, it is possible to get various data and operate the devices remotely. With spreading of IoT, attacks of malwares like Mirai and Hajime which target the IoT devices are increasing. For instance, a large-scale DDoS attack by infected devices as a springboard has occurred. Network monitoring tools for IoT devices have also been developed as attack measures against IoT devices. However, the developed tools have many types of software to be introduced and visualization of the network topology are not performed, so there is a problem that visually instantaneous abnormalities cannot be recognized. In this research, we develop a system that detects abnormality by machine learning, visualize a network topology, and notifies abnormality by alert visualization on the network topology. We measure the accuracy of abnormality detection and the real time property of visualization of alerts by actual machine experiments and show the effectiveness of the proposed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Ministry of Internal Affairs and Communications JAPAN: 2017 Information and Communications White Paper, Development of IoT in the Information and Communications Industry. http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h29/pdf/n3300000.pdf
IoT Security Headlines: IoT also needs security? https://www.trendmicro.com/jp/iot-security/special/26
Trend Micro Security Blog: Look back on the main cyber security case in 2016. http://blog.trendmicro.co.jp/archives/14203
Ministry of Economy: Trade and Industry JAPAN, Survey Results on the Recent Trends and Future Estimates of IT Human Resources. http://www.meti.go.jp/policy/it_policy/jinzai/27FY/ITjinzai_report_summary.pdf
Trend Micro: Security Solutions for the IoT Age. https://www.trendmicro.com/ja_jp/business/capabilities/solutions-for/iot.html
Trend Micro Security Blog: The Latest Trend of Threats Aimed at Linux. http://blog.trendmicro.co.jp/archives/13870
Medium and Small Business Information Security Measures Promotion Project: What is Malware. http://www.jnsa.org/ikusei/03/08-01.html
Malware Information Bureau: What is a botnet? How do you prevent it? https://eset-info.canon-its.jp/malware_info/trend/detail/150120_3.html
Malware information Bureau: C&C server. https://eset-info.canon-its.jp/malware_info/term/detail/00062.html
Internet Initiative Japan Internet Infrastructure Review, vol. 33. https://www.iij.ad.jp/dev/report/iir/033/01_01.html
Livnat, Y., Agutter, J., Moon, S., Erbacher, R.F., Foresti, S.: A visualization paradigm for network intrusion detection. In: Proceedings of 6th Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, SMC 2005, pp. 92–99 (2005)
Habe, H.: Random forest. IPSJ Technical report, 2012-CVIM-182(31), 1–8 (2012)
The UCI KDD Archive Information and Computer Science. University of California Irvine: KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Salunkhe, H.S., Jadhav, S., Bhosale, V.: Analysis and review of TCP SYN flood attack on network with its detection and performance metrics. Int. J. Eng. Res. Technol. 6(1), 250–256 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kunugi, Y., Suzuki, H., Koyama, A. (2020). IoT Security Viewer System Using Machine Learning. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_90
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_90
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)