toplogo
Sign In

Detecting Compromised IoT Devices Using Autoencoders and Sequential Hypothesis Testing


Core Concepts
An effective and efficient framework, named CUMAD, is developed to detect compromised IoT devices by integrating an autoencoder-based anomaly detection subsystem with a sequential probability ratio test (SPRT)-based sequential hypothesis testing subsystem.
Abstract
The paper presents the CUMAD framework for detecting compromised IoT devices. CUMAD consists of two main components: Anomaly Detection Component (ADC): Uses an autoencoder to learn the normal behavior of each IoT device during the training phase. Classifies input data points as normal or anomalous based on the reconstruction error. Cumulative Anomaly Component (CAC): Receives the output from ADC and accumulates evidence using a sequential probability ratio test (SPRT). Reaches a conclusion about whether the IoT device is compromised or not, based on the accumulated evidence. The key advantages of CUMAD are: It can effectively reduce the number of false alerts compared to using only the autoencoder-based anomaly detection scheme. It can detect compromised IoT devices quickly, requiring less than 5 observations on average. The evaluation studies using the public-domain N-BaIoT dataset show that CUMAD can on average reduce the false positive rate from about 3.57% using only the autoencoder-based anomaly detection scheme to about 0.5%.
Stats
The N-BaIoT dataset contains 115 statistical features extracted from network traffic at different levels of aggregation, including source IP, source MAC-IP, channel, and socket.
Quotes
"CUMAD can greatly improve the performance in detecting compromised IoT devices in terms of false positive rate compared to the methods only relying on individual anomalous input data points." "As a sequential method, CUMAD can quickly detect compromised IoT devices."

Deeper Inquiries

How can CUMAD be extended to handle new types of security attacks on IoT devices that were not present in the training data

To extend CUMAD to handle new types of security attacks on IoT devices not present in the training data, a few strategies can be implemented. One approach is to continuously update the training data by incorporating samples of new attacks as they are identified. This ongoing learning process allows the model to adapt to emerging threats. Additionally, implementing a feedback loop where the system learns from false negatives and false positives can enhance its ability to detect novel attacks. Utilizing transfer learning techniques, where knowledge from detecting known attacks is transferred to identify new ones, can also be beneficial in expanding CUMAD's capabilities.

What are the potential limitations of the SPRT-based approach in CUMAD, and how can they be addressed

While SPRT is a powerful statistical tool, it has some limitations that need to be considered. One limitation is the sensitivity to the choice of thresholds for false positive and false negative rates. Inaccurate setting of these thresholds can impact the detection performance. To address this, a thorough analysis of the trade-offs between false positives and false negatives is essential. Additionally, SPRT may require a large number of observations to reach a decision in certain scenarios, which can delay the detection process. Implementing adaptive threshold adjustment mechanisms based on the evolving network behavior can help mitigate this limitation and improve the efficiency of the detection process.

How can the CUMAD framework be integrated with other IoT security mechanisms, such as firmware updates and access control, to provide a more comprehensive defense against IoT security threats

Integrating the CUMAD framework with other IoT security mechanisms can create a more robust defense against security threats. One way to enhance security is by combining CUMAD with firmware update mechanisms. By monitoring network traffic for anomalies indicative of potential attacks, CUMAD can trigger firmware updates on IoT devices to patch vulnerabilities and strengthen their security posture. Furthermore, integrating CUMAD with access control mechanisms can provide a layered defense approach. CUMAD can flag suspicious activities, prompting access control systems to restrict unauthorized access to compromised devices, preventing further damage. This synergy between anomaly detection and proactive security measures can significantly enhance the overall security of IoT environments.
0
visual_icon
generate_icon
translate_icon
scholar_search_icon
star