Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2023

26.04.2023

Anomaly traffic detection based on feature fluctuation for secure industrial internet of things

verfasst von: Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The detection of anomaly traffic in internet of things (IoT) is mainly based on the original binary data at the traffic packet level and the structured data at the session flow level. This kind of dataset has a single feature extraction method and relies on prior manual knowledge. It is easy to lose critical information during data processing, which reduces the validity and robustness of the dataset. In this paper, we first construct a new anomaly traffic dataset based on the traffic packet and session flow data in the Iot-23 dataset. Second, we propose a feature extraction method based on feature fluctuation. Our proposed method can effectively solve the disadvantage that the data collected in different scenarios have different characteristics, which leads to the feature containing less information. Compared with the traditional anomaly traffic detection model, experiments show that our proposed method based on feature fluctuation has stronger robustness, can improve the accuracy of anomaly traffic detection and the generalization ability of the traditional model, and is more conducive to the detection of anomalous traffic in IoT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang K, Liang X, Lu R, Shen X (2014) Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet Things J 1(5):372–383CrossRef Zhang K, Liang X, Lu R, Shen X (2014) Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet Things J 1(5):372–383CrossRef
2.
Zurück zum Zitat Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Niyato D, Dobre OA, Poor HV (2022) 6G internet of things: A comprehensive survey. IEEE Internet Things J 9(1):359–383CrossRef Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Niyato D, Dobre OA, Poor HV (2022) 6G internet of things: A comprehensive survey. IEEE Internet Things J 9(1):359–383CrossRef
3.
Zurück zum Zitat Yang H, Liang S, Ni J, Li H, Shen X (2020) Secure and Efficient k NN Classification for Industrial Internet of Things. IEEE Internet Things J 7(11):10945–10954CrossRef Yang H, Liang S, Ni J, Li H, Shen X (2020) Secure and Efficient k NN Classification for Industrial Internet of Things. IEEE Internet Things J 7(11):10945–10954CrossRef
4.
Zurück zum Zitat Guo F, Yu FR, Zhang H, Li X, Ji H, Leung VCM (2021) Enabling massive IoT toward 6G: A comprehensive survey. IEEE Internet Things J 8(15):11891–11915CrossRef Guo F, Yu FR, Zhang H, Li X, Ji H, Leung VCM (2021) Enabling massive IoT toward 6G: A comprehensive survey. IEEE Internet Things J 8(15):11891–11915CrossRef
5.
Zurück zum Zitat Caprolu M, Di Pietro R, Lombardi F, Raponi S (2019) Edge computing perspectives: Architectures, technologies, and open security issues. IEEE International Conference on Edge Computing (EDGE), pp 116–123 Caprolu M, Di Pietro R, Lombardi F, Raponi S (2019) Edge computing perspectives: Architectures, technologies, and open security issues. IEEE International Conference on Edge Computing (EDGE), pp 116–123
6.
Zurück zum Zitat Lee R, Jang RY, Park M, Jeon GY, Kim JK, Lee SH (2020) Making IoT data ready for smart city applications. IEEE International Conference on Big Data and Smart Computing (BigComp), pp 605–608 Lee R, Jang RY, Park M, Jeon GY, Kim JK, Lee SH (2020) Making IoT data ready for smart city applications. IEEE International Conference on Big Data and Smart Computing (BigComp), pp 605–608
7.
Zurück zum Zitat Harsha Vardhini PA, Harsha MS, Sai PN, Srikanth P (2020) IoT based smart medicine assistive system for memory impairment patient. 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp 182–186 Harsha Vardhini PA, Harsha MS, Sai PN, Srikanth P (2020) IoT based smart medicine assistive system for memory impairment patient. 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp 182–186
8.
Zurück zum Zitat Sanil N, Venkat PAN, Rakesh V, Mallapur R, Ahmed MR (2020) Deep learning techniques for obstacle detection and avoidance in driverless cars. International Conference on Artificial Intelligence and Signal Processing (AISP), pp 1–4 Sanil N, Venkat PAN, Rakesh V, Mallapur R, Ahmed MR (2020) Deep learning techniques for obstacle detection and avoidance in driverless cars. International Conference on Artificial Intelligence and Signal Processing (AISP), pp 1–4
9.
Zurück zum Zitat Zhang M, Leng W, Ding Y, Tang C (2018) Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things. IEEE Access 6:33859–33870CrossRef Zhang M, Leng W, Ding Y, Tang C (2018) Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things. IEEE Access 6:33859–33870CrossRef
10.
Zurück zum Zitat Zhao M, Ding Y, Wu Q, Wang Y, Qin B, Fan K (2021) Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wireless Pers Commun 116(3):1765–1783CrossRef Zhao M, Ding Y, Wu Q, Wang Y, Qin B, Fan K (2021) Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wireless Pers Commun 116(3):1765–1783CrossRef
11.
Zurück zum Zitat Haji SH, Ameen SY (2021) Attack and anomaly detection in IoT networks using machine learning techniques: A review. Asian Journal of Research in Computer Science 9(2):30–46CrossRef Haji SH, Ameen SY (2021) Attack and anomaly detection in IoT networks using machine learning techniques: A review. Asian Journal of Research in Computer Science 9(2):30–46CrossRef
12.
Zurück zum Zitat Tsochev G (2020) Some security problems and aspects of the industrial internet of things. International Conference on Information Technologies (InfoTech), pp 1–5 Tsochev G (2020) Some security problems and aspects of the industrial internet of things. International Conference on Information Technologies (InfoTech), pp 1–5
13.
Zurück zum Zitat Zhao R et al (2021) An efficient intrusion detection method based on dynamic autoencoder. IEEE Wireless Communications Letters 10(8):1707–1711CrossRef Zhao R et al (2021) An efficient intrusion detection method based on dynamic autoencoder. IEEE Wireless Communications Letters 10(8):1707–1711CrossRef
14.
Zurück zum Zitat Zhao R et al (2022) A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J 9(12):9960–9972MathSciNetCrossRef Zhao R et al (2022) A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J 9(12):9960–9972MathSciNetCrossRef
15.
Zurück zum Zitat Hasan M, Islam MM, Zarif M, Hashem M (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7:2542–6605CrossRef Hasan M, Islam MM, Zarif M, Hashem M (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7:2542–6605CrossRef
16.
Zurück zum Zitat Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp 0305–0310 Alrashdi I, Alqazzaz A, Aloufi E, Alharthi R, Zohdy M, Ming H (2019) AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp 0305–0310
17.
Zurück zum Zitat Bagui S, Wang X, Bagui S (2021) Machine learning based intrusion detection for IoT botnet. International Journal of Machine Learning and Computing 11(6):399–406CrossRef Bagui S, Wang X, Bagui S (2021) Machine learning based intrusion detection for IoT botnet. International Journal of Machine Learning and Computing 11(6):399–406CrossRef
18.
Zurück zum Zitat Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Breitenbacher D, Shabtai A, Elovici Y (2018) N-BaIoT network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22CrossRef Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Breitenbacher D, Shabtai A, Elovici Y (2018) N-BaIoT network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22CrossRef
19.
Zurück zum Zitat Wang T, Bhuiyan MZA, Wang G, Qi L, Wu J, Hayajneh T (2020) Preserving balance between privacy and data integrity in edge-assisted internet of things. IEEE Internet Things J 7(4):2679–2689CrossRef Wang T, Bhuiyan MZA, Wang G, Qi L, Wu J, Hayajneh T (2020) Preserving balance between privacy and data integrity in edge-assisted internet of things. IEEE Internet Things J 7(4):2679–2689CrossRef
20.
Zurück zum Zitat Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Xiao H, Gao J, Ren K (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. 13th ACM Conference on Embedded Networked Sensor Systems, pp 183–196 Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Xiao H, Gao J, Ren K (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. 13th ACM Conference on Embedded Networked Sensor Systems, pp 183–196
21.
Zurück zum Zitat Elmrabit N, Zhou F, Li F, Zhou H (2020) Evaluation of machine learning algorithms for anomaly detection. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp 1-8 Elmrabit N, Zhou F, Li F, Zhou H (2020) Evaluation of machine learning algorithms for anomaly detection. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp 1-8
22.
Zurück zum Zitat Liu Z, Thapa N, Shaver A, Roy K, Yuan X, Khorsandroo S (2020) Anomaly detection on IoT network intrusion using machine learning, in International Conference on Artificial Intelligence. Computing and Data Communication Systems (icABCD), Big Data, pp 1–5 Liu Z, Thapa N, Shaver A, Roy K, Yuan X, Khorsandroo S (2020) Anomaly detection on IoT network intrusion using machine learning, in International Conference on Artificial Intelligence. Computing and Data Communication Systems (icABCD), Big Data, pp 1–5
24.
Zurück zum Zitat Cao L, Liu Z, Huang TS (2010) Cross-dataset action detection. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1998–2005 Cao L, Liu Z, Huang TS (2010) Cross-dataset action detection. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1998–2005
25.
Zurück zum Zitat Lorbach M, Kyriakou E, Poppe R, Dam E, Noldus L, Veltkamp R (2018) Learning to recognize rat social behavior: Novel dataset and crossdataset application. J Neurosci Methods 300:166–172CrossRef Lorbach M, Kyriakou E, Poppe R, Dam E, Noldus L, Veltkamp R (2018) Learning to recognize rat social behavior: Novel dataset and crossdataset application. J Neurosci Methods 300:166–172CrossRef
26.
Zurück zum Zitat Qin X, Chen Y, Wang J, Yu C (2019) Cross-dataset activity recognition via adaptive spatial-temporal transfer learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3(4) Qin X, Chen Y, Wang J, Yu C (2019) Cross-dataset activity recognition via adaptive spatial-temporal transfer learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3(4)
27.
Zurück zum Zitat Sha F, Hu H, Chao W (2018) Cross-dataset adaptation for visual question answering. IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 5716–5725 Sha F, Hu H, Chao W (2018) Cross-dataset adaptation for visual question answering. IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 5716–5725
28.
Zurück zum Zitat Antol S, Agrawal A, Lu J, Mitchell M, Batra D, Zitnick C, Parikh D (2015) Vqa: Visual question answering. Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp 2425–2433 Antol S, Agrawal A, Lu J, Mitchell M, Batra D, Zitnick C, Parikh D (2015) Vqa: Visual question answering. Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp 2425–2433
29.
Zurück zum Zitat Zhu Y, Groth O, Bernstein M, Li F (2016) Visual7w: Grounded question answering in images. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 4995–5004 Zhu Y, Groth O, Bernstein M, Li F (2016) Visual7w: Grounded question answering in images. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 4995–5004
31.
Zurück zum Zitat Peker M, Arslan A, Sen B, Celebi FV, But A (2015) A novel hybrid method for determining the depth of anesthesia level: Combining relief feature selection and random forest algorithm (ReliefF+RF). International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp 1–8 Peker M, Arslan A, Sen B, Celebi FV, But A (2015) A novel hybrid method for determining the depth of anesthesia level: Combining relief feature selection and random forest algorithm (ReliefF+RF). International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp 1–8
32.
Zurück zum Zitat Huang T, Sethu H, Kandasamy N (2016) A New Approach to Dimensionality Reduction for Anomaly Detection in Data Traffic. IEEE Trans Netw Serv Manag 13(3):651–665CrossRef Huang T, Sethu H, Kandasamy N (2016) A New Approach to Dimensionality Reduction for Anomaly Detection in Data Traffic. IEEE Trans Netw Serv Manag 13(3):651–665CrossRef
33.
Zurück zum Zitat Villamarin-Salomon R, Brustoloni JC (2008) Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, in 5th IEEE Consumer Communications and Networking Conference. NV, USA, Las Vegas, pp 476–481 Villamarin-Salomon R, Brustoloni JC (2008) Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, in 5th IEEE Consumer Communications and Networking Conference. NV, USA, Las Vegas, pp 476–481
34.
Zurück zum Zitat Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2015) Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans Comput 64(9)2519–2533 Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2015) Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans Comput 64(9)2519–2533
35.
Zurück zum Zitat Rubner Y, Tomasi C, Guibas LJ (2000) The earth mover??s distance as a metric for image retrieval. Int J Comput Vis 40:99–121CrossRefMATH Rubner Y, Tomasi C, Guibas LJ (2000) The earth mover??s distance as a metric for image retrieval. Int J Comput Vis 40:99–121CrossRefMATH
36.
Zurück zum Zitat Ling H, Okada K (2006) An efficient earth movers distance algorithm for robust histogram comparison. IEEE Transactions on PAMI 29(5):840–853CrossRef Ling H, Okada K (2006) An efficient earth movers distance algorithm for robust histogram comparison. IEEE Transactions on PAMI 29(5):840–853CrossRef
37.
Zurück zum Zitat Holmes A, Rose C, Taylor C (2002) Transforming pixel signatures into an improved metric space. Image Vis Comput 20(9):701–707CrossRef Holmes A, Rose C, Taylor C (2002) Transforming pixel signatures into an improved metric space. Image Vis Comput 20(9):701–707CrossRef
Metadaten
Titel
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
verfasst von
Jie Yin
Chuntang Zhang
Wenwei Xie
Guangjun Liang
Lanping Zhang
Guan Gui
Publikationsdatum
26.04.2023
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2023
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01482-0

Weitere Artikel der Ausgabe 4/2023

Peer-to-Peer Networking and Applications 4/2023 Zur Ausgabe

Premium Partner