There is a newer version of the record available.

Published October 28, 2020 | Version v1
Conference paper Open

Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

  • 1. Information Security Group, Royal Holloway

Description

Low-powered and resource-constrained devices are forming a greater part of our smart networks. For this reason, they have recently been the target of various cyber-attacks. However, these devices often cannot implement traditional intrusion detection systems (IDS), or they can not produce or store the audit trails needed for inspection. Therefore, it is often necessary to adapt existing IDS systems and malware detection approaches to cope with these constraints. We explore the application of unsupervised learning techniques, specifically clustering, to develop a novel IDS for networks composed of low-powered devices. We describe our solution, called Clust-IT (Clustering of IoT), to manage heterogeneous data collected from cooperative and distributed networks of connected devices and searching these data for indicators of compromise while remaining protocol agnostic. We outline a novel application of OPTICS to various available IoT datasets, composed of both packet and flow captures, to demonstrate the capabilities of the proposed techniques and evaluate their feasibility in developing an IoT IDS.

Files

46-Clustit.pdf

Files (2.0 MB)

Name Size Download all
md5:92cee3ba8f0b5f1bec4c265332b024a0
2.0 MB Preview Download

Additional details

Related works

Is previous version of
Journal article: https: //doi.org/10.1145/3407023.3409201 (Handle)

Funding

FutureTPM – Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module 779391
European Commission