Abstract
The number of Internet of Things (IoT) devices used in eldercare are increasing day by day and bringing big security challenges especially for health care organizations, IoT service providers and most seriously for the elderly users. Attackers launch many attacks using compromised IoT devices such as Distributed Denial of Services (DDoS), among others. To detect and prevent these types of attacks on IoT devices connected to the cellular network, it is essential to have a proper overview of the existing threats and vulnerabilities. The main objective of this work is to present and compare different machine learning algorithms for anomaly detection in the cellular IoT scenario. Five supervised machine learning algorithms, namely KNN, Naïve Bayes, Decision Tree and Logistic Regression are used and evaluated by their performance. We see that, for both normal (using a local test dataset) and attack traffic (CICDDoS2019 (CICDDoS2019 Dataset: https://www.unb.ca/cic/datasets/ddos-2019.html.)) datasets, the accuracy and precision of the models are in average above 90%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Wireshark: www.wireshark.com.
- 2.
Secure 5G4IoT Lab: https://5g4iot.vlab.cs.hioa.no/.
- 3.
CICDDoS2019 Dataset: https://www.unb.ca/cic/datasets/ddos-2019.html.
- 4.
Python: www.python.org.
- 5.
Scikit-Learn: www.scikit-learn.org.
References
Patel, K.K., Patel, S.M., et al.: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122–6131 (2016)
Chen, S., et al.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)
Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horizons 58(4), 431–440 (2015)
Rawat, P., Singh, K.D., Bonnin, J.M.: Cognitive radio for M2M and Internet of Things: a survey. Comput. Commun. 94, 1–29 (2016)
Ericsson: IoT connections outlook. https://www.ericsson.com/en/mobility-report/reports/june-2020/iot-connectionsoutlook
Jejdling, F. (Ericsson): Ericsson Mobility Report. https://www.ericsson.com/en/mobility-report/reports
Stackpole, B.: Symantec Security Summary, June 2020. COVID-19 attacks continue and new threats on the rise. https://symantec-enterprise-blogs.security.com/blogs/featurestories/symantec-security-summary-june-2020
Khoi, N.M., et al.: IReHMo: an efficient IoT-based remote health monitoring system for smart regions. In: 2015 17th International Conference on E-health Networking, Application and Services (Health-Com), pp. 563–568. IEEE (2015)
Gope, P., Hwang, T.: BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2015)
Heer, T., et al.: Security challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61, 527–542 (2011)
Van der Elzen, I., van Heugten, J.: Techniques for detecting compromised IoT devices. University of Amsterdam (2017)
Saqlain, J.: IoT and 5G: history evolution and its architecture their compatibility and future (2018)
Zhou, W., et al.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606–1616 (2018)
Copos, B., et al.: Is anybody home? Inferring activity from smart home network traffic. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 245–251. IEEE (2016)
Noorman, J., et al.: Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In: 22nd fUSENIXg Security Symposium (fUSENIXg Security 2013), pp. 479–498 (2013)
Xiao, L., et al.: IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)
He, Z., Zhang, T., Lee, R.B.: Machine learning based DDoS attack detection from source side in cloud. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 114–120. IEEE (2017)
Bakker, J.: Intelligent traffic classification for detecting DDoS attacks using SDN/OpenFlow (2017)
Bediako, P.K.: Long short-term memory recurrent neural network for detecting DDoS flooding attacks within TensorFlow implementation framework (2017)
Adeniyi, D.A., Wei, Z., Yongquan, Y.: Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method. Appl. Comput. Inform. 12(1), 90–108 (2016)
Tian, F., et al.: Research on flight phase division based on decision tree classifier. In: 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), pp. 372–375. IEEE (2017)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)
Patil, T.R., Sherekar, S.S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. J. Comput. Sci. Appl. 6(2), 256–261 (2013)
Wikipedia: Logistic regression. https://en.wikipedia.org/wiki/Logistic_regression
Oo, T.T., Phyu, T.: Analysis of DDoS detection system based on anomaly detection system. In: International Conference on Advances in Engineering and Technology (ICAET 2014), Singapore (2014)
Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29–35. IEEE (2018)
Cross-industry standard process for data mining. https://en.wikipedia.org/wiki/Cross-industry_standard_process_for_data_mining
Acknowledgement
This paper is a result of the H2020 Concordia project (https://www.concordia-h2020.eu) which has received funding from the EU H2020 programme under grant agreement No 830927. The CONCORDIA consortium includes 23 partners from industry and other organizations such as Telenor, Telefonica, Telecom Italia, Ericsson, Siemens, Airbus, etc. and 23 partners from academia such as CODE, university of Twente, OsloMet, etc.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Santos, B. et al. (2021). Anomaly Detection in Cellular IoT with Machine Learning. In: Pires, I.M., Spinsante, S., Zdravevski, E., Lameski, P. (eds) Smart Objects and Technologies for Social Good. GOODTECHS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 401. Springer, Cham. https://doi.org/10.1007/978-3-030-91421-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-91421-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91420-2
Online ISBN: 978-3-030-91421-9
eBook Packages: Computer ScienceComputer Science (R0)