Iot Network Behavioral Fingerprint Inference With Limited Network Traces For Cyber Investigation

Jonathan Pan
{"title":"Iot Network Behavioral Fingerprint Inference With Limited Network Traces For Cyber Investigation","authors":"Jonathan Pan","doi":"10.1109/ICAIIC51459.2021.9415273","DOIUrl":null,"url":null,"abstract":"The development and adoption of Internet of Things (IoT) devices will grow significantly in the coming years to enable Industry 4.0. Many forms of IoT devices will be developed and used across industry verticals. However, the euphoria of this technology adoption is shadowed by the solemn presence of cyber threats that will follow its growth trajectory. Cyber threats would either embed their malicious code or attack vulnerabilities in IoT that could induce significant consequences in cyber and physical realms. In order to manage such destructive effects, incident responders and cyber investigators require the capabilities to find these rogue IoT, contain them quickly and protect other legitimate IoTs from attacks. Such online devices may only leave network activity traces. A collection of relevant traces could be used to infer the IoT’s network behavioral fingerprints and in turn could facilitate investigative find of these IoT. However, the challenge is how to infer these fingerprints when there are limited network activity traces. This research proposes a novel model construct that learns to infer the network behavioral fingerprint of specific IoT based on limited network activity traces using a One-Class Time Series Meta-learner called DeepNetPrint. Our research demonstrated our model to perform comparative well to supervised machine learning model trained with lots of network activity traces to identify IoT devices.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIIC51459.2021.9415273","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The development and adoption of Internet of Things (IoT) devices will grow significantly in the coming years to enable Industry 4.0. Many forms of IoT devices will be developed and used across industry verticals. However, the euphoria of this technology adoption is shadowed by the solemn presence of cyber threats that will follow its growth trajectory. Cyber threats would either embed their malicious code or attack vulnerabilities in IoT that could induce significant consequences in cyber and physical realms. In order to manage such destructive effects, incident responders and cyber investigators require the capabilities to find these rogue IoT, contain them quickly and protect other legitimate IoTs from attacks. Such online devices may only leave network activity traces. A collection of relevant traces could be used to infer the IoT’s network behavioral fingerprints and in turn could facilitate investigative find of these IoT. However, the challenge is how to infer these fingerprints when there are limited network activity traces. This research proposes a novel model construct that learns to infer the network behavioral fingerprint of specific IoT based on limited network activity traces using a One-Class Time Series Meta-learner called DeepNetPrint. Our research demonstrated our model to perform comparative well to supervised machine learning model trained with lots of network activity traces to identify IoT devices.
基于有限网络痕迹的物联网网络行为指纹推理
未来几年,物联网(IoT)设备的开发和采用将显著增长,以实现工业4.0。许多形式的物联网设备将被开发出来,并在垂直行业中使用。然而,随着这种技术的发展,随之而来的严峻的网络威胁给这种技术采用带来的喜悦蒙上了一层阴影。网络威胁会在物联网中嵌入恶意代码或攻击漏洞,从而在网络和物理领域造成严重后果。为了管理这种破坏性影响,事件响应人员和网络调查人员需要能够发现这些流氓物联网,快速控制它们并保护其他合法物联网免受攻击。这样的在线设备可能只会留下网络活动的痕迹。相关痕迹的收集可以用来推断物联网的网络行为指纹,反过来可以促进这些物联网的调查发现。然而,挑战在于如何在网络活动痕迹有限的情况下推断这些指纹。本研究提出了一种新的模型结构,该模型使用一种称为DeepNetPrint的单类时间序列元学习器,基于有限的网络活动痕迹,学习推断特定物联网的网络行为指纹。我们的研究表明,我们的模型与经过大量网络活动痕迹训练的监督机器学习模型相比,可以很好地识别物联网设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信