A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication

The fourth industrial revolution put on new rails processes of automation in industry, healthcare, home and other areas of human life through the mass integration of the concept of the Internet of Things into these areas. However, this concept leaves a number of potential "bottlenecks" in the security of such systems for attackers. Third-party access to data collected by smart devices in, for example, a smart home can lead to a variety of emergencies, the degree of danger of which will depend solely on the will of the owner of the intercepted data. In this paper we proposes a system for detecting anomalies and identifying smart home devices based on the collective communication of smart homes. The concept of the system is based on the benefits of combining smart homes into a social network in terms of improving the security of both a single smart home and the entire social network of combined smart homes. Detection of anomalies and identification of devices in each of the smart homes is based on monitoring network traffic and forming profiles of smart devices that are present in the network. Based on this, a whitelist of allowed profiles of devices operation in the cluster is formed. To verify the presence of a profile in the whitelist the Random Forest algorithm was used. A key feature of the system is the communication of smart home clusters with each other to exchange information about the available smart device profiles in the whitelists of each cluster. To evaluate the effectiveness of the proposed system, a number of experimental studies were conducted. The results of the experiments showed the overall accuracy of the system at the level of 97.21% with an average level of type I errors of 5.94%.

[1]  Sergii Lysenko,et al.  BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks , 2019, CN.

[2]  Sergii Lysenko,et al.  A botnet detection approach based on the clonal selection algorithm , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[3]  Sergii Lysenko,et al.  Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search , 2017, ICTERI.

[4]  Oleksandr Martynyuk,et al.  Hidden Fault Analysis of FPGA Projects for Critical Applications , 2020, 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET).

[5]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[6]  Sergii Lysenko,et al.  Dynamic Signature-based Malware Detection Technique Based on API Call Tracing , 2019, ICTERI Workshops.

[7]  Andreas Jacobsson,et al.  On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[8]  Paweł Dymora,et al.  Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent , 2019, Applied Sciences.

[9]  Oleg Savenko,et al.  Multi-agent Based Approach of Botnet Detection in Computer Systems , 2012, CN.

[10]  Olexander Barmak,et al.  Using visual analytics to develop human and machine‐centric models: A review of approaches and proposed information technology , 2020, Comput. Intell..

[11]  Oleg Savenko,et al.  An Android Malware Detection Method Based on CNN Mixed-Data Model , 2020, ICTERI Workshops.

[12]  Arunan Sivanathan,et al.  IoT Behavioral Monitoring via Network Traffic Analysis , 2020, ArXiv.

[13]  Oksana Pomorova,et al.  Metamorphic Viruses Detection Technique Based on the the Modified Emulators , 2016, ICTERI.

[14]  Masayuki Murata,et al.  Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions , 2020, IEEE Transactions on Consumer Electronics.

[15]  Leonid Bedratyuk,et al.  The star sequence and the general first Zagreb index , 2017, 1706.00829.

[16]  Zahid Ullah,et al.  Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.

[17]  Xingquan Zhu,et al.  IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework , 2020, IoT.

[18]  Viktor Melnyk,et al.  Remote Synthesis of Computer Devices for FPGA-Based IoT Nodes , 2020, 2020 10th International Conference on Advanced Computer Information Technologies (ACIT).

[19]  Fahad Algarni,et al.  Challenges and Solutions for Applications and Technologies in the Internet of Things , 2017 .

[20]  Sasu Tarkoma,et al.  IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge , 2020, IEEE Transactions on Network and Service Management.

[21]  R. Kitchin,et al.  The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention , 2019, Smart Cities and Innovative Urban Technologies.

[22]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[23]  Sergii Lysenko,et al.  Detection of the botnets’ low-rate DDoS attacks based on self-similarity , 2020 .

[24]  Qusay H. Mahmoud,et al.  A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks , 2020, Electronics.

[25]  Sergii Lysenko,et al.  SVM-based Technique for Mobile Malware Detection , 2019, CMIS.

[26]  Oleksandr Martynyuk,et al.  Development of Checkability in FPGA Components of Safety-Related Systems , 2020, ICTES.

[27]  Vijay Sivaraman,et al.  Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Oleksandr Martynyuk,et al.  A method of the hidden faults elimination in FPGA projets for the critical applications , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[29]  George Markowsky,et al.  The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis , 2018, ICTERI Workshops.

[30]  Ali Abd Almisreb,et al.  DoS and DDoS vulnerability of IoT: A review , 2019, Sustainable Engineering and Innovation.

[31]  Eduard Manziuk Approach to creating an ensemble on a hierarchy of clusters using model decisions correlation , 2020 .

[32]  Yu Chen,et al.  Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[33]  A. Melnyk,et al.  Self-Configurable FPGA-Based Computer Systems , 2013 .

[34]  Karuna Pande Joshi,et al.  Anomaly Detection Models for Smart Home Security , 2019, 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).

[35]  Sergii Lysenko,et al.  Approach for the unknown metamorphic virus detection , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).