IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example

Cover Page

Cite item

Full Text

Abstract

The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.

About the authors

O. I. Shelukhin

Moscow Technical University of Communications and Informatics

Email: sheluhin@mail.ru
ORCID iD: 0000-0001-7564-6744
SPIN-code: 5983-2285

S. Yu. Rybakov

Moscow Technical University of Communications and Informatics

Email: s.i.rybakov@mtuci.ru
ORCID iD: 0000-0002-4593-9009
SPIN-code: 5595-3762

References

  1. Minerva R., Biru A., Rotondi D. Towards a definition of the Internet of Things (IoT). Telecom Italia S.p.A., 2015. PP. 10–21. URL: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf (Accessed 25.10.2023)
  2. Dorsemaine B., Gaulier J.-P., Wary J.-P., Kheir N., Urien P. Internet of Things: A Definition & Taxonomy // Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST, Cambridge, UK, 09‒11 September 2015). IEEE, 2015. doi: 10.1109/NGMAST.2015.71
  3. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 // Statista. URL: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide (Accessed 12.02.2023)
  4. Demeter D., Preuss M., Shmelev Y. IoT: a malware story // Securelist. 2019. URL: https://securelist.com/iot-a-malware-story/94451 (Accessed 11.02.2023)
  5. Шевцов В.Ю., Касимовский Н.П. Анализ угроз и уязвимостей концепций IOT и IIOT // НБИ технологии. 2020. Т. 14. № 3. С. 28–35. doi: 10.15688/NBIT.jvolsu.2020.3.5
  6. Шелухин О.И. Сетевые аномалии. Обнаружение, локализация, прогнозирование. М.: Горячая линия ‒ Телеком, 2019. 448 с.
  7. Шелухин О.И. Осин А.В. Смольский С.М. Самоподобие и фракталы. Телекоммуникационные приложения. М.: Физматлит. 2008. 368 с.
  8. Sheluhin O.I., Lukin I.Yu. Network traffic anomalies detection using fixing method of jumps of multifractal dimension in the real-time mode // Automatic Control and Computer Sciences. 2018. Vol. 52. Iss. 5. PP. 421−430. doi: 10.3103/S01464 11618050115
  9. Шелухин О.И., Рыбаков С.Ю., Ванюшина А.В. Модификация алгоритма обнаружения сетевых атак методом фиксации скачков фрактальной размерности в режиме online // Труды учебных заведений связи. 2022. Т. 8. № 3. С. 117‒126. doi: 10.31854/1813-324X-2022-8-3-117-126
  10. Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode // Proceedings of the Conference on Wave Electronics and its Application in Information and Telecommunication Systems (WECONF, St. Petersburg, Russia, 30 May ‒ 03 June 2022). IEEE, 2022. doi: 10.1109/WECONF55058.2022.9803635
  11. Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks // Proceedings of the Conference on Systems of Signals Generating and Processing in the Field of on Board Communications (Moscow, Russia, 14‒16 March 2023). IEEE, 2023. doi: 10.1109/IEEECONF56737.2023.10092157
  12. Большаков А.С., Губанкова Е.В. Обнаружение аномалий в компьютерных сетях с использованием методов машинного обучения // REDS: Телекоммуникационные устройства и системы. 2020. Т. 10. № 1. С. 37‒42.
  13. Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection // arXiv:1802.09089. 2018. doi: 10.48550/arXiv.1802.09089
  14. Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi, et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features // Proceedings of the Second International Conference on Intelligent Systems and Pattern Recognition (ISPR 2022, Hammamet, Tunisia, 24–26 March 2022). Communications in Computer and Information Science. Cham: Springer; 2022. Vol. 1589. PP. 306–314. doi: 10.1007/978-3-031-08277-1_25
  15. Alabdulatif A., Rizvi S.S.H. Machine Learning Approach for Improvement in Kitsune NID // Intelligent Automation & Soft Computing. 2022. Vol. 32. Iss. 2. PP. 827‒840. doi: 10.32604/iasc.2022.021879


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies