Clust-IT: Clustering-Based Intrusion Detection in IoT Environments
Description
Low-powered and resource-constrained devices are forming a greater part of our smart networks. For this reason, they have recently been the target of various cyber-attacks. However, these devices often cannot implement traditional intrusion detection systems (IDS), or they can not produce or store the audit trails needed for inspection. Therefore, it is often necessary to adapt existing IDS systems and malware detection approaches to cope with these constraints. We explore the application of unsupervised learning techniques, specifically clustering, to develop a novel IDS for networks composed of low-powered devices. We describe our solution, called Clust-IT (Clustering of IoT), to manage heterogeneous data collected from cooperative and distributed networks of connected devices and searching these data for indicators of compromise while remaining protocol agnostic. We outline a novel application of OPTICS to various available IoT datasets, composed of both packet and flow captures, to demonstrate the capabilities of the proposed techniques and evaluate their feasibility in developing an IoT IDS.
Files
46-Clustit.pdf
Files
(2.0 MB)
Name | Size | Download all |
---|---|---|
md5:92cee3ba8f0b5f1bec4c265332b024a0
|
2.0 MB | Preview Download |
Additional details
Related works
- Is previous version of
- Journal article: https: //doi.org/10.1145/3407023.3409201 (Handle)