MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices

Andrii Shalaginov, Oleksandr Semeniuta, M. Alazab
{"title":"MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices","authors":"Andrii Shalaginov, Oleksandr Semeniuta, M. Alazab","doi":"10.1145/3368235.3368876","DOIUrl":null,"url":null,"abstract":"Growing number of Smart Applications in recent years bring a completely new landscape of cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in Edge commonly have very limited computational resources and corresponding power source reducing the number of conventional cybersecurity measures available for deployment. This also puts strict requirements on how the signatures of malicious actions can be updated and actualized. It has been proved efficiency of Machine Learning models, Neural Networks in particular, in multiple tasks related to cybersecurity due to the high-abstract precise models and training from historical data. However, when it comes to the devices in Edge, it is clear that the extensive training of the model is not possible, while testing of new unseen data can be successfully done. In addition to the conventional understanding of off-line and on-line model training, this contribution looks into how the Machine Learning can be successfully deployed on IoT while putting unnecessary computations off-chip through parameters transfer over MQTT network, reducing computational footprint on micro-controllers. We believe that proposed approach will be beneficial for many applications in resource-constrained environment.","PeriodicalId":166357,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3368235.3368876","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

Growing number of Smart Applications in recent years bring a completely new landscape of cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in Edge commonly have very limited computational resources and corresponding power source reducing the number of conventional cybersecurity measures available for deployment. This also puts strict requirements on how the signatures of malicious actions can be updated and actualized. It has been proved efficiency of Machine Learning models, Neural Networks in particular, in multiple tasks related to cybersecurity due to the high-abstract precise models and training from historical data. However, when it comes to the devices in Edge, it is clear that the extensive training of the model is not possible, while testing of new unseen data can be successfully done. In addition to the conventional understanding of off-line and on-line model training, this contribution looks into how the Machine Learning can be successfully deployed on IoT while putting unnecessary computations off-chip through parameters transfer over MQTT network, reducing computational footprint on micro-controllers. We believe that proposed approach will be beneficial for many applications in resource-constrained environment.
MEML:用于物联网边缘设备网络攻击检测的基于资源感知mqtt的机器学习
近年来,越来越多的智能应用程序带来了一个全新的网络攻击和利用场景,这是以前从未见过的。Edge中的设备通常具有非常有限的计算资源和相应的电源,从而减少了可用于部署的传统网络安全措施的数量。这也对如何更新和实现恶意行为的签名提出了严格的要求。机器学习模型,特别是神经网络,由于其高度抽象的精确模型和从历史数据中进行训练,在与网络安全相关的多个任务中已经证明了其效率。然而,当涉及到Edge中的设备时,很明显,不可能对模型进行广泛的训练,而可以成功地测试新的未见过的数据。除了对离线和在线模型训练的传统理解之外,该贡献还研究了机器学习如何成功地部署在物联网上,同时通过MQTT网络上的参数传输将不必要的计算放在片外,从而减少微控制器上的计算占用。我们相信,所提出的方法将有利于资源受限环境下的许多应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信