IoT Security Viewer System Using Machine Learning

  • Yuya Kunugi
  • Hiroyuki Suzuki
  • Akio KoyamaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 926)


Recently, Internet of Things (IoT) are spreading and various things are connected to the Internet. As the results, it is possible to get various data and operate the devices remotely. With spreading of IoT, attacks of malwares like Mirai and Hajime which target the IoT devices are increasing. For instance, a large-scale DDoS attack by infected devices as a springboard has occurred. Network monitoring tools for IoT devices have also been developed as attack measures against IoT devices. However, the developed tools have many types of software to be introduced and visualization of the network topology are not performed, so there is a problem that visually instantaneous abnormalities cannot be recognized. In this research, we develop a system that detects abnormality by machine learning, visualize a network topology, and notifies abnormality by alert visualization on the network topology. We measure the accuracy of abnormality detection and the real time property of visualization of alerts by actual machine experiments and show the effectiveness of the proposed system.


  1. 1.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  2. 2.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  3. 3.
    Ministry of Internal Affairs and Communications JAPAN: 2017 Information and Communications White Paper, Development of IoT in the Information and Communications Industry.
  4. 4.
    IoT Security Headlines: IoT also needs security?
  5. 5.
    Trend Micro Security Blog: Look back on the main cyber security case in 2016.
  6. 6.
    Ministry of Economy: Trade and Industry JAPAN, Survey Results on the Recent Trends and Future Estimates of IT Human Resources.
  7. 7.
  8. 8.
    Trend Micro Security Blog: The Latest Trend of Threats Aimed at Linux.
  9. 9.
    Medium and Small Business Information Security Measures Promotion Project: What is Malware.
  10. 10.
    Malware Information Bureau: What is a botnet? How do you prevent it?
  11. 11.
  12. 12.
    Internet Initiative Japan Internet Infrastructure Review, vol. 33.
  13. 13.
    Livnat, Y., Agutter, J., Moon, S., Erbacher, R.F., Foresti, S.: A visualization paradigm for network intrusion detection. In: Proceedings of 6th Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, SMC 2005, pp. 92–99 (2005)Google Scholar
  14. 14.
    Habe, H.: Random forest. IPSJ Technical report, 2012-CVIM-182(31), 1–8 (2012)Google Scholar
  15. 15.
    The UCI KDD Archive Information and Computer Science. University of California Irvine: KDD Cup 1999 Data.
  16. 16.
    Salunkhe, H.S., Jadhav, S., Bhosale, V.: Analysis and review of TCP SYN flood attack on network with its detection and performance metrics. Int. J. Eng. Res. Technol. 6(1), 250–256 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Informatics, Faculty of EngineeringYamagata UniversityYonezawaJapan
  2. 2.Department of Informatics, Graduate School of Science and EngineeringYamagata UniversityYonezawaJapan

Personalised recommendations