Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning (2312.00034v1)

Published 20 Nov 2023 in cs.CR, cs.AI, and cs.NI

Abstract: This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT), such as attack classification and device-type identification. Our approach involves training and evaluating a DL model using a range of diverse IoT-related datasets, allowing us to gain valuable insights into how adaptable and practical these models can be when confronted with various IoT configurations. We initially convert the unstructured network traffic data from IoT networks, stored in PCAP files, into images by processing the packet data. This conversion process adapts the data to meet the criteria of DL classification methods. The experiments showcase the ability of DL to surpass the constraints tied to manually engineered features, achieving superior results in attack detection and maintaining comparable outcomes in device-type identification. Additionally, a notable feature extraction time difference becomes evident in the experiments: traditional methods require around 29 milliseconds per data packet, while DL accomplishes the same task in just 2.9 milliseconds. The significant time gap, DL's superior performance, and the recognized limitations of manually engineered features, presents a compelling call to action within the IoT community. This encourages us to shift from exploring new IoT features for each dataset to addressing the challenges of integrating DL into IoT, making it a more efficient solution for real-world IoT scenarios.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (42)
  1. Ahmet Aksoy and Mehmet Hadi Gunes. 2019. Automated iot device identification using network traffic. In ICC 2019-2019 IEEE international conference on communications (ICC). IEEE, 1–7.
  2. Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks. J. Internet Serv. Inf. Secur. 9, 4 (2019), 1–17.
  3. ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things Journal 9, 1 (2021), 485–496.
  4. Network traffic analysis based iot device identification. In Proceedings of the 2020 4th International Conference on Big Data and Internet of Things. 79–89.
  5. Towards the development of a realistic multidimensional IoT profiling dataset. In 2022 19th Annual International Conference on Privacy, Security & Trust (PST). IEEE, 1–11.
  6. Issues and future directions in traffic classification. IEEE network 26, 1 (2012), 35–40.
  7. Machine learning raw network traffic detection. In Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III, Vol. 11746. SPIE, 185–194.
  8. A feature exploration approach for IoT attack type classification. In 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 582–588.
  9. Payload-byte: A tool for extracting and labeling packet capture files of modern network intrusion detection datasets. In 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT). IEEE, 58–67.
  10. Encrypted malicious traffic detection based on word2vec. Electronics 11, 5 (2022), 679.
  11. Canadian Institute for Cybersecurity (CIC). [n. d.]. CIC IoT Dataset 2023. https://www.unb.ca/cic/datasets/iotdataset-2023.html.
  12. Packet2vec: Utilizing word2vec for feature extraction in packet data. arXiv preprint arXiv:2004.14477 (2020).
  13. Recent advances in convolutional neural networks. Pattern recognition 77 (2018), 354–377.
  14. Seungho Jeon and Jongsub Moon. 2020. Malware-detection method with a convolutional recurrent neural network using opcode sequences. Information Sciences 535 (2020), 1–15.
  15. Sydney M Kasongo and Yanxia Sun. 2020. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data 7 (2020), 1–20.
  16. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications 39, 18 (2012), 13492–13500.
  17. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019), 779–796.
  18. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278–2324.
  19. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing 24, 3 (2020), 1999–2012.
  20. ICLSTM: encrypted traffic service identification based on inception-LSTM neural network. Symmetry 13, 6 (2021), 1080.
  21. IoT device identification based on network traffic characteristics. In GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 6067–6072.
  22. Audi: Toward autonomous iot device-type identification using periodic communication. IEEE Journal on Selected Areas in Communications 37, 6 (2019), 1402–1412.
  23. ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the symposium on applied computing. 506–509.
  24. Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv:1709.04647 (2017).
  25. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, 2177–2184.
  26. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013).
  27. Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems 26 (2013).
  28. N Moustafa. [n. d.]. Ton-iot datasets (2019). doi: 10.21227/fesz-dm97. URL http://dx. doi. org/10.21227/fesz-dm97 ([n. d.]).
  29. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment. (2023).
  30. Unveiling the potential of graph neural networks for robust intrusion detection. ACM SIGMETRICS Performance Evaluation Review 49, 4 (2022), 111–117.
  31. Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach. In Proceedings of the Internet Measurement Conference. 267–279.
  32. Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications (2022), 1–14.
  33. IoT devices recognition through network traffic analysis. In 2018 IEEE international conference on big data (big data). IEEE, 5187–5192.
  34. Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing 18, 8 (2018), 1745–1759.
  35. UNSW-Sydney. [n. d.]. UNSW-Sydney IEEE TMC 2018. https://iotanalytics.unsw.edu.au/iottraces.html. Accessed: 2023.
  36. IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning. Future Internet 15, 3 (2023), 102.
  37. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, 43–48.
  38. Malware traffic classification using convolutional neural network for representation learning. In 2017 International conference on information networking (ICOIN). IEEE, 712–717.
  39. Li Yang and Abdallah Shami. 2022. A transfer learning and optimized CNN based intrusion detection system for Internet of Vehicles. In ICC 2022-IEEE International Conference on Communications. IEEE, 2774–2779.
  40. An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph. Security and Communication Networks 2022 (2022).
  41. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5 (2017), 21954–21961.
  42. IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, 230–234.
Citations (2)

Summary

We haven't generated a summary for this paper yet.