Influence of autoencoder latent space on classifying IoT CoAP attacks
-
García-Ordás, María Teresa
3
-
Aveleira-Mata, Jose
1
-
García-Rodrígez, Isaías
2
- Luis Casteleiro-Roca, José 5
-
Bayón-Gutiérrez, Martín
6
-
Alaiz-Moretón, Héctor
4
- 1 Research Institute of Applied Sciences in Cybersecurity (RIASC) MIC , University of León, 24071 León, Spain, jose.aveleira@unileon.es
- 2 Department of Electrical and Systems Engineering , University of León, Escuela de Ingenierías, Campus de Vegazana, 24071 León, Spain, igarr@unileon.es
- 3 Department of Electrical and Systems Engineering , University of León, Escuela de Ingenierías, Campus de Vegazana, 24071 León, Spain, mgaro@unileon.es
- 4 Research Institute of Applied Sciences in Cybersecurity (RIASC) MIC , University of León, 24071 León, Spain, hector.moreton@unileon.es
- 5 Department of Industrial Engineering , University of A Coruña, CTC, CITIC Avda. 19 de febrero s/n, 15405, Ferrol, A Coruña, Spain, jose.luis.casteleiro@udc.es
- 6 Department of Electrical and Systems Engineering , University of León, Escuela de Ingenierías, Campus de Vegazana, 24071 León, Spain, martin.bayon@unileon.es
ISSN: 1367-0751, 1368-9894
Year of publication: 2024
Type: Article
More publications in: Logic Journal of the IGPL
Abstract
The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a model-based intrusion detection system (IDS) for IoT environments. Specifically, the study explores the efficacy of an autoencoder’s latent space combined with three different classification techniques. Utilizing a validated IoT dataset, particularly focusing on the Constrained Application Protocol (CoAP), the study seeks to develop a robust model capable of identifying security breaches targeting this protocol. The research culminates in a comprehensive evaluation, presenting encouraging results that demonstrate the effectiveness of the proposed methodologies in strengthening IoT cybersecurity with more than a 99% of precision using only 2 learned feature
Bibliographic References
- Abusitta, (2023), Internet of Things, 21, pp. 100656, 10.1016/j.iot.2022.100656
- Arreaga, (2023), Procedia Computer Science, 224, pp. 223, 10.1016/j.procs.2023.09.031
- Breiman, (2001), Machine Learning, 45, pp. 5, 10.1023/A:1010933404324
- Chen, (2016), 10.1145/2939672.2939785
- Correia, (2016), IEEE Internet of Things Journal, 3, pp. 923, 10.1109/JIOT.2016.2517120
- De, (2023), 10.1007/978-981-19-2004-2_35
- Dutta, (2022), Logic Journal of the IGPL, 30, pp. 912, 10.1093/jigpal/jzac002
- Elmezughi, (2023), Heliyon, 9, pp. e19685, 10.1016/j.heliyon.2023.e19685
- Fereidouni, (2023)
- Granjal, (2018), Sensors, 18, pp. 2445, 10.3390/s18082445
- Hassan, (2023), Wireless Personal Communications, 128, pp. 2753, 10.1007/s11277-022-10069-6
- Jiang, (2023), Pattern Recognition Letters, 174, pp. 145, 10.1016/j.patrec.2023.09.001
- Josso, (2023), Ore Geology Reviews, 162, pp. 105671, 10.1016/j.oregeorev.2023.105671
- Kingsford, (2008), Nature Biotechnology, 26, pp. 1011, 10.1038/nbt0908-1011
- Kovatsch, (2022)
- Lin, (2017), IEEE Internet of Things Journal, 4, pp. 1125, 10.1109/JIOT.2017.2683200
- Patel, (2021)
- Mathews, (2022), Proceedings—2022 6th International Conference on Cryptography, Security and Privacy, CSP 2022, pp. 91
- Pumsirirat, (2018), Technical Report 1, 10.14569/IJACSA.2018.090103
- Rizzardi, (2022), Wireless Networks, 28, pp. 2857, 10.1007/s11276-022-02999-7
- Shelby, (2014), 10.17487/rfc7252
- Statista, (2019)
- Sun, (2024), Expert Systems With Applications, 237, pp. 121549, 10.1016/j.eswa.2023.121549
- Sutikno, (2022), TELKOMNIKA (Telecommunication Computing Electronics and Control), 20, pp. 1399, 10.12928/telkomnika.v20i6.22028
- Mahesh, (2023), Healthcare Analytics, 4, pp. 100247, 10.1016/j.health.2023.100247
- Thomas, (2017), eCrime Researchers Summit, eCrime, pp. 79
- Vigoya, (2023), Applied Sciences, 13, pp. 4482, 10.3390/app13074482
- Westphall, (2020), 2020 IEEE Sensors Applications Symposium (SAS), pp. 1, 10.1109/SAS48726.2020.9220033
- Whitmore, (2015), Information Systems Frontiers, 10.1007/s10796-014-9489-2
- Yao, (2023), Sensors, 23, 10.3390/s23084141