journal article Open Access Jul 15, 2021

Using Autoencoders for Anomaly Detection and Transfer Learning in IoT

Computers Vol. 10 No. 7 pp. 88 · MDPI AG
View at Publisher Save 10.3390/computers10070088
Abstract
With the development of Internet of Things (IoT) technologies, more and more smart devices are connected to the Internet. Since these devices were designed for better connections with each other, very limited security mechanisms have been considered. It would be costly to develop separate security mechanisms for the diverse behaviors in different devices. Given new and changing devices and attacks, it would be helpful if the characteristics of diverse device types could be dynamically learned for better protection. In this paper, we propose a machine learning approach to device type identification through network traffic analysis for anomaly detection in IoT. Firstly, the characteristics of different device types are learned from their generated network packets using supervised learning methods. Secondly, by learning important features from selected device types, we further compare the effects of unsupervised learning methods including One-class SVM, Isolation forest, and autoencoders for dimensionality reduction. Finally, we evaluate the performance of anomaly detection by transfer learning with autoencoders. In our experiments on real data in the target factory, the best performance of device type identification can be achieved by XGBoost with an accuracy of 97.6%. When adopting autoencoders for learning features from the network packets in Modbus TCP protocol, the best F1 score of 98.36% can be achieved. Comparable performance of anomaly detection can be achieved when using autoencoders for transfer learning from the reference dataset in the literature to our target site. This shows the potential of the proposed approach for automatic anomaly detection in smart factories. Further investigation is needed to verify the proposed approach using different types of devices in different IoT environments.
Topics

No keywords indexed for this article. Browse by subject →

References
23
[1]
Pappu, R.S. (2001). Physical One-Way Functions. [Ph.D. Thesis, Massachusetts Institute of Technology].
[2]
Huang "A PUF-based unified identity verification framework for secure IoT hardware via device authentication" World Wide Web J. (2020) 10.1007/s11280-019-00677-x
[3]
Miettinen, M., Marchal, S., Hafeez, I., Sadeghi, A., Asokan, N., and Tarkoma, S. (2017, January 5–8). IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, USA. 10.1109/icdcs.2017.283
[4]
Shahid, M.R., Blanc, G., Zhang, Z., and Debar, H. (2018, January 10–13). IoT Devices Recognition Through Network Traffic Analysis. Proceedings of the IEEE International Conference on Big Data (BigData 2018), Seattle, WA, USA. 10.1109/bigdata.2018.8622243
[5]
Ngo, M.V., Chaouchi, H., Luo, T., and Quek, T.Q.S. (2020, January 7–8). Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing. Proceedings of the AAAI Workshop on Artificial Intelligence of Things (AIoT), New York, NY, USA. 10.1109/icdcs47774.2020.00191
[6]
Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., and Ming, H. (2019, January 7–9). AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA. 10.1109/ccwc.2019.8666450
[7]
Hasan "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches" Internet Things (2019) 10.1016/j.iot.2019.100059
[8]
Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro, Naveen Chilamkurti

Future Generation Computer Systems 2018 10.1016/j.future.2017.08.043
[9]
Koroniotis "Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset" Future Gener. Comput. Syst. (2019) 10.1016/j.future.2019.05.041
[10]
Yang "Evaluating Feature Selection and Anomaly Detection Methods of Hard Drive Failure Prediction" IEEE Trans. Reliab. (2021) 10.1109/tr.2020.2995724
[11]
Injadat "Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection" IEEE Trans. Netw. Serv. Manag. (2021) 10.1109/tnsm.2020.3014929
[12]
Galatro "Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review" Eng. Appl. Artif. Intell. (2021) 10.1016/j.engappai.2021.104216
[13]
Belgrana, F.Z., Benamrane, N., Hamaida, M.A., Chaabani, A.M., and Taleb-Ahmed, A. (2021, January 27–28). Network Intrusion Detection System Using Neural Network and Condensed Nearest Neighbors with Selection of NSL-KDD Influencing Features. Proceedings of the 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), BALI, Indonesia. 10.1109/iotais50849.2021.9359689
[14]
Sakurada, M., and Yairi, T. (2014, January 2). Anomaly detection using autoencoders with nonlinear dimensionality reduction. Proceedings of the Pacific Rim International Conference on Artificial Intelligence (PRICAI), Workshop on Machine Learning for Sensory Data Analysis (MLSDA), Gold Coast, Australia. 10.1145/2689746.2689747
[15]
Lee, J., Pak, J., and Lee, M. (2020, January 21–23). Network Intrusion Detection System using Feature Extraction based on Deep Sparse Autoencoder. Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea. 10.1109/ictc49870.2020.9289253
[16]
Wang, J.H., and Septian, T.W. (2021, January 11–14). Combining Oversampling with Recurrent Neural Networks for Intrusion Detection. Proceedings of the 26th International Conference on Database Systems for Advanced Applications (DASFAA 2021) Workshops, Virtual, Taipei, Taiwan. 10.1007/978-3-030-73216-5_21
[17]
Anton, S.D.D., Kanoor, S., Fraunholz, D., and Schotten, H.D. (2018, January 27–28). Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany. 10.1145/3230833.3232818
[18]
Zolanvari "Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things" IEEE Internet Things J. (2019) 10.1109/jiot.2019.2912022
[19]
Estimating the Support of a High-Dimensional Distribution

Bernhard Schölkopf, John C. Platt, John Shawe-Taylor et al.

Neural Computation 2001 10.1162/089976601750264965
[20]
Liu, F.T., Ting, K.M., and Zhou, Z.-H. (2008, January 15–19). Isolation Forest. Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy. 10.1109/icdm.2008.17
[21]
Aggarwal "Theoretical Foundations and Algorithms for Outlier Ensembles" ACM SIGKDD Explor. Newsl. (2015) 10.1145/2830544.2830549
[22]
Kingma, D.P., and Ba, J. (2015, January 7–9). Adam: A Method for Stochastic Optimization. Proceedings of the 3rd International Conference on Learning Representations ICLR 2015, San Diego, CA, USA.
[23]
Anton, S.D.D., Sinha, S., and Schotten, H.D. (2019, January 19–21). Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia. 10.23919/softcom.2019.8903672
Metrics
56
Citations
23
References
Details
Published
Jul 15, 2021
Vol/Issue
10(7)
Pages
88
License
View
Funding
Ministry of Science and Technology, Taiwan Award: MOST109-2221-E-027-090
National Applied Research Laboratories, Taiwan Award: NARL- ISIM-109-002
Institute of Information Industry, Taiwan Award: Artificial Intelligence Oriented for Cyber Security Technology Collaboration Project (1/4)
Cite This Article
Chin-Wei Tien, Tse-Yung Huang, Ping-Chun Chen, et al. (2021). Using Autoencoders for Anomaly Detection and Transfer Learning in IoT. Computers, 10(7), 88. https://doi.org/10.3390/computers10070088
Related

You May Also Like