IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example
- Authors: Shelukhin O.I.1, Rybakov S.Y.1
-
Affiliations:
- Moscow Technical University of Communications and Informatics
- Issue: Vol 9, No 5 (2023)
- Pages: 112-119
- Section: Articles
- URL: https://journals.rcsi.science/1813-324X/article/view/254400
- ID: 254400
Cite item
Full Text
Abstract
The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.
About the authors
O. I. Shelukhin
Moscow Technical University of Communications and Informatics
Email: sheluhin@mail.ru
ORCID iD: 0000-0001-7564-6744
SPIN-code: 5983-2285
S. Yu. Rybakov
Moscow Technical University of Communications and Informatics
Email: s.i.rybakov@mtuci.ru
ORCID iD: 0000-0002-4593-9009
SPIN-code: 5595-3762
References
- Minerva R., Biru A., Rotondi D. Towards a definition of the Internet of Things (IoT). Telecom Italia S.p.A., 2015. PP. 10–21. URL: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf (Accessed 25.10.2023)
- Dorsemaine B., Gaulier J.-P., Wary J.-P., Kheir N., Urien P. Internet of Things: A Definition & Taxonomy // Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST, Cambridge, UK, 09‒11 September 2015). IEEE, 2015. doi: 10.1109/NGMAST.2015.71
- Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 // Statista. URL: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide (Accessed 12.02.2023)
- Demeter D., Preuss M., Shmelev Y. IoT: a malware story // Securelist. 2019. URL: https://securelist.com/iot-a-malware-story/94451 (Accessed 11.02.2023)
- Шевцов В.Ю., Касимовский Н.П. Анализ угроз и уязвимостей концепций IOT и IIOT // НБИ технологии. 2020. Т. 14. № 3. С. 28–35. doi: 10.15688/NBIT.jvolsu.2020.3.5
- Шелухин О.И. Сетевые аномалии. Обнаружение, локализация, прогнозирование. М.: Горячая линия ‒ Телеком, 2019. 448 с.
- Шелухин О.И. Осин А.В. Смольский С.М. Самоподобие и фракталы. Телекоммуникационные приложения. М.: Физматлит. 2008. 368 с.
- Sheluhin O.I., Lukin I.Yu. Network traffic anomalies detection using fixing method of jumps of multifractal dimension in the real-time mode // Automatic Control and Computer Sciences. 2018. Vol. 52. Iss. 5. PP. 421−430. doi: 10.3103/S01464 11618050115
- Шелухин О.И., Рыбаков С.Ю., Ванюшина А.В. Модификация алгоритма обнаружения сетевых атак методом фиксации скачков фрактальной размерности в режиме online // Труды учебных заведений связи. 2022. Т. 8. № 3. С. 117‒126. doi: 10.31854/1813-324X-2022-8-3-117-126
- Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode // Proceedings of the Conference on Wave Electronics and its Application in Information and Telecommunication Systems (WECONF, St. Petersburg, Russia, 30 May ‒ 03 June 2022). IEEE, 2022. doi: 10.1109/WECONF55058.2022.9803635
- Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks // Proceedings of the Conference on Systems of Signals Generating and Processing in the Field of on Board Communications (Moscow, Russia, 14‒16 March 2023). IEEE, 2023. doi: 10.1109/IEEECONF56737.2023.10092157
- Большаков А.С., Губанкова Е.В. Обнаружение аномалий в компьютерных сетях с использованием методов машинного обучения // REDS: Телекоммуникационные устройства и системы. 2020. Т. 10. № 1. С. 37‒42.
- Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection // arXiv:1802.09089. 2018. doi: 10.48550/arXiv.1802.09089
- Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi, et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features // Proceedings of the Second International Conference on Intelligent Systems and Pattern Recognition (ISPR 2022, Hammamet, Tunisia, 24–26 March 2022). Communications in Computer and Information Science. Cham: Springer; 2022. Vol. 1589. PP. 306–314. doi: 10.1007/978-3-031-08277-1_25
- Alabdulatif A., Rizvi S.S.H. Machine Learning Approach for Improvement in Kitsune NID // Intelligent Automation & Soft Computing. 2022. Vol. 32. Iss. 2. PP. 827‒840. doi: 10.32604/iasc.2022.021879