Lerina Aversano, M. Bernardi, Marta Cimitile, R. Pecori
{"title":"通过深度学习实现物联网实际流量异常检测","authors":"Lerina Aversano, M. Bernardi, Marta Cimitile, R. Pecori","doi":"10.1109/ICMLA52953.2021.00275","DOIUrl":null,"url":null,"abstract":"The detection and classification of Internet traffic was studied in depth in the last twenty years, but this is still an open research issue as pertains the Internet of Things (IoT), mainly because real IoT traffic dataset are not very widespread. With this paper, we make public an integrated dataset, made of actual IoT network flows, built using six different network sources, which could represent a research reference for further investigations. Furthermore, we exploited it to optimize the hyper-parameters of a deep neural network and evaluate its performance for both distinguishing normal and abnormal traffic and discriminating different types of attacks, achieving very good results.","PeriodicalId":6750,"journal":{"name":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","volume":"233 1","pages":"1736-1741"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anomaly Detection of actual IoT traffic flows through Deep Learning\",\"authors\":\"Lerina Aversano, M. Bernardi, Marta Cimitile, R. Pecori\",\"doi\":\"10.1109/ICMLA52953.2021.00275\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The detection and classification of Internet traffic was studied in depth in the last twenty years, but this is still an open research issue as pertains the Internet of Things (IoT), mainly because real IoT traffic dataset are not very widespread. With this paper, we make public an integrated dataset, made of actual IoT network flows, built using six different network sources, which could represent a research reference for further investigations. Furthermore, we exploited it to optimize the hyper-parameters of a deep neural network and evaluate its performance for both distinguishing normal and abnormal traffic and discriminating different types of attacks, achieving very good results.\",\"PeriodicalId\":6750,\"journal\":{\"name\":\"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)\",\"volume\":\"233 1\",\"pages\":\"1736-1741\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMLA52953.2021.00275\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLA52953.2021.00275","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Anomaly Detection of actual IoT traffic flows through Deep Learning
The detection and classification of Internet traffic was studied in depth in the last twenty years, but this is still an open research issue as pertains the Internet of Things (IoT), mainly because real IoT traffic dataset are not very widespread. With this paper, we make public an integrated dataset, made of actual IoT network flows, built using six different network sources, which could represent a research reference for further investigations. Furthermore, we exploited it to optimize the hyper-parameters of a deep neural network and evaluate its performance for both distinguishing normal and abnormal traffic and discriminating different types of attacks, achieving very good results.