Lerina Aversano, M. Bernardi, Marta Cimitile, R. Pecori
{"title":"Anomaly Detection of actual IoT traffic flows through Deep Learning","authors":"Lerina Aversano, M. Bernardi, Marta Cimitile, R. Pecori","doi":"10.1109/ICMLA52953.2021.00275","DOIUrl":null,"url":null,"abstract":"The detection and classification of Internet traffic was studied in depth in the last twenty years, but this is still an open research issue as pertains the Internet of Things (IoT), mainly because real IoT traffic dataset are not very widespread. With this paper, we make public an integrated dataset, made of actual IoT network flows, built using six different network sources, which could represent a research reference for further investigations. Furthermore, we exploited it to optimize the hyper-parameters of a deep neural network and evaluate its performance for both distinguishing normal and abnormal traffic and discriminating different types of attacks, achieving very good results.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"233 1","pages":"1736-1741"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLA52953.2021.00275","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The detection and classification of Internet traffic was studied in depth in the last twenty years, but this is still an open research issue as pertains the Internet of Things (IoT), mainly because real IoT traffic dataset are not very widespread. With this paper, we make public an integrated dataset, made of actual IoT network flows, built using six different network sources, which could represent a research reference for further investigations. Furthermore, we exploited it to optimize the hyper-parameters of a deep neural network and evaluate its performance for both distinguishing normal and abnormal traffic and discriminating different types of attacks, achieving very good results.