Nothing Special   »   [go: up one dir, main page]

loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Masataka Nakahara ; Norihiro Okui ; Yasuaki Kobayashi and Yutaka Miyake

Affiliation: KDDI Research, Inc., 3–10–10, Iidabashi, Chiyoda-ku, Tokyo, Japan

Keyword(s): IoT Security, Anomaly Detection, Machine Learning.

Abstract: As the number of IoT (Internet of Things) devices increases, the countermeasures against cyberattacks caused by IoT devices become more important. Although mechanisms to prevent malware infection to IoT devices are important, such prevention becomes hard due to sophisticated infection steps and lack of computational resource for security software in IoT devices. Therefore, detecting malware infection of devices is also important to suppress malware spread. As the types of IoT devices and malwares are increasing, advanced anomaly detection technology like machine learning is required to find malware infected devices. Because IoT devices cannot analyze own behavior by using machine learning due to limited computing resources, such analysis should be executed at gateway devices to the Internet. This paper proposes an architecture for detecting malware traffic using summarized statistical data of packets instead of whole packet information. As this proposal only uses information of amoun t of traffic and destination addresses for each IoT device, it can reduce the storage space taken up by data and can analyze number of IoT devices with low computational resources. We performed the malware traffic detection on proposed architecture by using machine learning algorithms of Isolation Forest and K-means clustering, and show that high accuracy can be achieved with the summarized statistical data. In the evaluation, we collected the statistical data from 26 IoT devices (9 categories), and obtained the result that the data size required for analysis is reduced over 90% with keeping high accuracy. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 65.254.225.175

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Nakahara, M. ; Okui, N. ; Kobayashi, Y. and Miyake, Y. (2020). Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. In Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - IoTBDS; ISBN 978-989-758-426-8; ISSN 2184-4976, SciTePress, pages 78-87. DOI: 10.5220/0009345300780087

@conference{iotbds20,
author={Masataka Nakahara and Norihiro Okui and Yasuaki Kobayashi and Yutaka Miyake},
title={Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data},
booktitle={Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - IoTBDS},
year={2020},
pages={78-87},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0009345300780087},
isbn={978-989-758-426-8},
issn={2184-4976},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - IoTBDS
TI - Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data
SN - 978-989-758-426-8
IS - 2184-4976
AU - Nakahara, M.
AU - Okui, N.
AU - Kobayashi, Y.
AU - Miyake, Y.
PY - 2020
SP - 78
EP - 87
DO - 10.5220/0009345300780087
PB - SciTePress

<style> #socialicons>a span { top: 0px; left: -100%; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;} #socialicons>ahover div{left: 0px;} </style>