Nothing Special   »   [go: up one dir, main page]

Skip to main content

IoT Security Viewer System Using Machine Learning

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Abstract

Recently, Internet of Things (IoT) are spreading and various things are connected to the Internet. As the results, it is possible to get various data and operate the devices remotely. With spreading of IoT, attacks of malwares like Mirai and Hajime which target the IoT devices are increasing. For instance, a large-scale DDoS attack by infected devices as a springboard has occurred. Network monitoring tools for IoT devices have also been developed as attack measures against IoT devices. However, the developed tools have many types of software to be introduced and visualization of the network topology are not performed, so there is a problem that visually instantaneous abnormalities cannot be recognized. In this research, we develop a system that detects abnormality by machine learning, visualize a network topology, and notifies abnormality by alert visualization on the network topology. We measure the accuracy of abnormality detection and the real time property of visualization of alerts by actual machine experiments and show the effectiveness of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  2. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  3. Ministry of Internal Affairs and Communications JAPAN: 2017 Information and Communications White Paper, Development of IoT in the Information and Communications Industry. http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h29/pdf/n3300000.pdf

  4. IoT Security Headlines: IoT also needs security? https://www.trendmicro.com/jp/iot-security/special/26

  5. Trend Micro Security Blog: Look back on the main cyber security case in 2016. http://blog.trendmicro.co.jp/archives/14203

  6. Ministry of Economy: Trade and Industry JAPAN, Survey Results on the Recent Trends and Future Estimates of IT Human Resources. http://www.meti.go.jp/policy/it_policy/jinzai/27FY/ITjinzai_report_summary.pdf

  7. Trend Micro: Security Solutions for the IoT Age. https://www.trendmicro.com/ja_jp/business/capabilities/solutions-for/iot.html

  8. Trend Micro Security Blog: The Latest Trend of Threats Aimed at Linux. http://blog.trendmicro.co.jp/archives/13870

  9. Medium and Small Business Information Security Measures Promotion Project: What is Malware. http://www.jnsa.org/ikusei/03/08-01.html

  10. Malware Information Bureau: What is a botnet? How do you prevent it? https://eset-info.canon-its.jp/malware_info/trend/detail/150120_3.html

  11. Malware information Bureau: C&C server. https://eset-info.canon-its.jp/malware_info/term/detail/00062.html

  12. Internet Initiative Japan Internet Infrastructure Review, vol. 33. https://www.iij.ad.jp/dev/report/iir/033/01_01.html

  13. Livnat, Y., Agutter, J., Moon, S., Erbacher, R.F., Foresti, S.: A visualization paradigm for network intrusion detection. In: Proceedings of 6th Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, SMC 2005, pp. 92–99 (2005)

    Google Scholar 

  14. Habe, H.: Random forest. IPSJ Technical report, 2012-CVIM-182(31), 1–8 (2012)

    Google Scholar 

  15. The UCI KDD Archive Information and Computer Science. University of California Irvine: KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  16. Salunkhe, H.S., Jadhav, S., Bhosale, V.: Analysis and review of TCP SYN flood attack on network with its detection and performance metrics. Int. J. Eng. Res. Technol. 6(1), 250–256 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akio Koyama .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kunugi, Y., Suzuki, H., Koyama, A. (2020). IoT Security Viewer System Using Machine Learning. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_90

Download citation

Publish with us

Policies and ethics