Conference paper Open Access

Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

Markiewicz, R.; Sgandurra, D.


JSON-LD (schema.org) Export

{
  "inLanguage": {
    "alternateName": "eng", 
    "@type": "Language", 
    "name": "English"
  }, 
  "description": "<p>Low-powered and resource-constrained devices are forming a greater part of our smart networks. For this reason, they have recently been the target of various cyber-attacks. However, these devices often cannot implement traditional intrusion detection systems (IDS), or they can not produce or store the audit trails needed for inspection. Therefore, it is often necessary to adapt existing IDS systems and malware detection approaches to cope with these constraints. We explore the application of unsupervised learning techniques, specifically clustering, to develop a novel IDS for networks composed of low-powered devices. We describe our solution, called Clust-IT (Clustering of IoT), to manage heterogeneous data collected from cooperative and distributed networks of connected devices and searching these data for indicators of compromise while remaining protocol agnostic. We outline a novel application of OPTICS to various available IoT datasets, composed of both packet and flow captures, to demonstrate the capabilities of the proposed techniques and evaluate their feasibility in developing an IoT IDS.</p>", 
  "license": "https://creativecommons.org/licenses/by/4.0/legalcode", 
  "creator": [
    {
      "affiliation": "Information Security Group, Royal Holloway", 
      "@type": "Person", 
      "name": "Markiewicz, R."
    }, 
    {
      "affiliation": "Information Security Group, Royal Holloway", 
      "@type": "Person", 
      "name": "Sgandurra, D."
    }
  ], 
  "headline": "Clust-IT: Clustering-Based Intrusion Detection in IoT Environments", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "datePublished": "2020-10-28", 
  "url": "https://zenodo.org/record/4222626", 
  "@type": "ScholarlyArticle", 
  "@context": "https://schema.org/", 
  "identifier": "https://doi.org/10.5281/zenodo.4222626", 
  "@id": "https://doi.org/10.5281/zenodo.4222626", 
  "workFeatured": {
    "@type": "Event", 
    "name": "15th International ARES Conference on Availability, Reliability and Security"
  }, 
  "name": "Clust-IT: Clustering-Based Intrusion Detection in IoT Environments"
}
98
121
views
downloads
All versions This version
Views 9823
Downloads 12183
Data volume 232.9 MB158.5 MB
Unique views 9121
Unique downloads 11582

Share

Cite as