LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

Learning Latent Representation for IoT Anomaly Detection

Vu, L. and Cao, V.L. and Nguyen, Q.U. and Nguyen, D.N. and Hoang, D.T. and Dutkiewicz, E. (2022) Learning Latent Representation for IoT Anomaly Detection. IEEE Transactions on Cybernetics, 52 (5). pp. 3769-3782. ISSN 21682267

Full text not available from this repository. (Upload)

Abstract

Internet of Things (IoT) has emerged as a cutting-edge technology that is changing human life. The rapid and widespread applications of IoT, however, make cyberspace more vulnerable, especially to IoT-based attacks in which IoT devices are used to launch attack on cyber-physical systems. Given a massive number of IoT devices (in order of billions), detecting and preventing these IoT-based attacks are critical. However, this task is very challenging due to the limited energy and computing capabilities of IoT devices and the continuous and fast evolution of attackers. Among IoT-based attacks, unknown ones are far more devastating as these attacks could surpass most of the current security systems and it takes time to detect them and 'cure' the systems. To effectively detect new/unknown attacks, in this article, we propose a novel representation learning method to better predictively 'describe' unknown attacks, facilitating supervised learning-based anomaly detection methods. Specifically, we develop three regularized versions of autoencoders (AEs) to learn a latent representation from the input data. The bottleneck layers of these regularized AEs trained in a supervised manner using normal data and known IoT attacks will then be used as the new input features for classification algorithms. We carry out extensive experiments on nine recent IoT datasets to evaluate the performance of the proposed models. The experimental results demonstrate that the new latent representation can significantly enhance the performance of supervised learning methods in detecting unknown IoT attacks. We also conduct experiments to investigate the characteristics of the proposed models and the influence of hyperparameters on their performance. The running time of these models is about 1.3 ms that is pragmatic for most applications. © 2013 IEEE.

Item Type: Article
Divisions: Faculties > Faculty of Information Technology
Identification Number: 10.1109/TCYB.2020.3013416
Uncontrolled Keywords: Anomaly detection; Cyber Physical System; Cybersecurity; Embedded systems; Supervised learning, Anomaly detection; Auto encoders; Autoencoder; Cutting edge technology; Cyberspaces; Human lives; Internet-of-thing -based attack; Latent representation; Performance; Unknown attacks, Internet of things, article; autoencoder; classification algorithm; feature learning (machine learning); human; internet of things; outlier detection; running
URI: http://eprints.lqdtu.edu.vn/id/eprint/10445

Actions (login required)

View Item
View Item