Network Traffic Attention Features Fusion for Unauthorized IoT Devices Detection

  • Tạ Minh Thanh Le Quy Don Technical University
  • Duong Van Dan
Keywords: Internet of Things (IoT), deep learning, IoT device identification, attention features fusion method (AFF), IoT device detection, feature fusion, image processing

Abstract

The demand for using IoT devices is increasing because of its usefulness. IoT devices are present in all areas of life. They make life easier and more comfortable. Moreover, many companies and households are tending to increase in the use of IoT devices to turn on/off home, school, office into smart home, smart school, smart office and so on. Although IoT devices are very useful, they have major security problems because they are not interested, leading to a large number of security holes and creating opportunities for hackers to attack the systems. In this paper, we develop an attention features fusion (AFF) method for the purpose of classifying and detecting IoT devices that are not in the pre-registered white list. Our recommended technique finds the features with the best classifier ability, then converts them into images and uses ensemble learning based on the baseline models which are deep learning models to detect and classify. Our proposed solution helps to detect strange devices that are exchanging data in the IoT network, reducing the risk of the system being attacked by hackers. According to the experimental results, our method achieves very good results when we detect ten IoT devices with up to 97.85% accuracy

References

L. S. Vailshery, “Number of internet of things (iot) connected devices worldwide from 2019 to 2021, with forecasts from 2022 to 2030,” Available at https://www.statista.com/statistics/1183457/iot-connecteddevices-worldwide/ (2022/27/12).

Cisco, “Cisco annual internet report (2018–2023),” Available at https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.pdf (2022/12/06).

T. Robinson, “Interpol warns iot devices at risk,” Available at https://www.scmagazine.com/news/architecture/interpolwarns-iot-devices-at-risk (2022/27/12).

J. Margolis, T. T. Oh, S. Jadhav, Y. H. Kim, and J. N. Kim, “An in-depth analysis of the mirai botnet,” in 2017 International Conference on Software Security and Assurance (ICSSA), 2017, pp. 6–12.

“Shodan,” Available at https://www.shodan.io/ (2022/27/12).

“Owasp iot top 10 2018,” Available at https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf (2022/27/12).

Y. Liu, J. Wang, J. Li, S. Niu, and H. Song, “Machine learning for the detection and identification of internet of things devices: A survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 298–320, 2022.

S. Sivanandam and S. Deepa, Genetic Algorithms. Springer Berlin Heidelberg, 2008, pp. 15–37.

F. Nie, W. Zhu, and X. Li, “Decision tree svm: An extension of linear svm for non-linear classification,” Neurocomputing, vol. 401, pp. 153–159, 2020.

M. Arun Kumar and M. Gopal, “A hybrid svm based decision tree,” Pattern Recognition, vol. 43, no. 12, pp. 3977–3987, 2010.

A. Aksoy and M. H. Gunes, “Automated iot device identification using network traffic,” in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, pp. 1–7.

H. Jmila, G. Blanc, M. R. Shahid, and M. Lazrag, “A survey of smart home iot device classification using machine learning-based network traffic analysis,” IEEE Access, vol. 10, pp. 97 117–97 141, 2022.

P. Bashivan, I. Rish, M. Yeasin, and N. Codella, “Learning representations from eeg with deep recurrent-convolutional neural networks,” 11 2015.

M. Naz, J. H. Shah, M. A. Khan, M. Sharif, M. Raza, and R. Damasevi ˇ cius, “From ECG signals to images: a ˇtransformation based approach for deep learning,” PeerJ Comput Sci, vol. 7, p. e386, Feb. 2021.

H. Qassim, A. Verma, and D. Feinzimer, “Compressed residual-vgg16 cnn model for big data places image recognition,” in 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018, pp. 169–175.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in Neural Information Processing Systems, vol. 25. Curran Associates, Inc., 2012.

S. Ray, “A quick review of machine learning algorithms,”in 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 2019, pp. 35–39.

L. Bottou, C. Cortes, J. Denker, H. Drucker, I. Guyon, L. Jackel, Y. LeCun, U. Muller, E. Sackinger, P. Simard, and V. Vapnik, “Comparison of classifier methods: a case study in handwritten digit recognition,” in Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5),

vol. 2, 1994, pp. 77–82 vol.2.

T. Li, D. Jin, C. Du, X. Cao, H. Chen, J. Yan, N. Chen, Z. Chen, Z. Feng, and S. Liu, “The image-based analysis and classification of urine sediments using a lenet-5 neural network,” Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, vol. 8, no. 1, pp.109–114, 2020.

S. Lu, Z. Lu, and Y.-D. Zhang, “Pathological brain detectionbased on alexnet and transfer learning,” Journal of Computational Science, vol. 30, pp. 41–47, 2019.

A. Baldominos, Y. Saez, and P. Isasi, “A survey of handwritten character recognition with mnist and emnist,” AppliedSciences, vol. 9, no. 15, 2019.

I. García-Magarino, R. Muttukrishnan, and J. Lloret, “Human-centric ai for trustworthy iot systems with explainable multilayer perceptrons,” IEEE Access, vol. 7, pp.125 562–125 574, 2019.

X. Dong, Z. Yu, W. Cao, Y. Shi, and Q. Ma, “A survey onensemble learning,” Frontiers of Computer Science, vol. 14,no. 2, pp. 241–258, Apr 2020.

O. Sagi and L. Rokach, “Ensemble learning: A survey,”WIREs Data Mining and Knowledge Discovery, vol. 8, no. 4,p. e1249, 2018.

Published
2023-11-28