NUST Institutional Repository

Transfer Learning Autoencoder Neural Networks For Anomaly Detection In Malware Infected IoT Devices

Show simple item record

dc.contributor.author Shafiq, Unsub
dc.date.accessioned 2022-04-25T09:00:04Z
dc.date.available 2022-04-25T09:00:04Z
dc.date.issued 2022
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/29278
dc.description.abstract Distributed Denial of Service (DDoS) attacks have persisted against defensive measures with their sheer capability of obscurity and the simplicity of the attack vectors that they exploit, i.e exhausting the victim’s computing resources. The advent of Internet of-Things (IoT) has led to a massive increase in smart internet-connected devices that often have customized firmware with limited and irregular security patches. This has made them targets for hosting bot malware and can contribute to traffic in a DDoS attack. Many researchers have worked on developing anomaly detectors to identify possible infected hosts and have incorporated ML models within their techniques as well. However, the ubiquity of IoT devices has made training ML models on a per device and per-malware basis impractical. In this thesis, we focus on the autoencoder neural-network-based anomaly detection technique and evaluate the efficacy of the transfer-learning technique in reducing the training time of anomaly models for IoT devices. We base our hypothesis on the intu ition that similar IoT devices should have a similar network footprint and therefore, the latent representation of network footprint should be transferable across devices. The study bases itself on the NBaIoT [1] dataset, which consists of 115 traffic features of real IoT devices infected with Mirai and Bashlite. We observe that while the accu racy of an anomaly model decreased when tested against data from a new IoT device, re-training the innermost layers of the autoencoder with at least 10% of the available dataset restored the anomaly model’s performance. We further evaluate the capability of autoencoders against the CIC-IDS2017 dataset; consisting of network-flow information derived from PCAP data, which can be considered more synonymous with IPFIX/Net flow record formats prevalent in the industry. xi en_US
dc.description.sponsorship Dr. Muhammad Khuram Shahzad en_US
dc.language.iso en en_US
dc.publisher SEECS, National University of Sciences & Technology Islamabad en_US
dc.subject Detection In Malware Infected IoT Devices-Autoencoder Neural Networks en_US
dc.title Transfer Learning Autoencoder Neural Networks For Anomaly Detection In Malware Infected IoT Devices en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [379]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account