2020 9th Mediterranean Conference on Embedded Computing (MECO) 2020
DOI: 10.1109/meco49872.2020.9134241
|View full text |Cite
|
Sign up to set email alerts
|

IoT Network Attack Detection and Mitigation

Abstract: Cyberattacks on the Internet of Things (IoT) can cause major economic and physical damage, and disrupt production lines, manufacturing processes, supply chains, impact the physical safety of vehicles, and damage the health of human beings. Thus we describe and evaluate a distributed and robust attack detection and mitigation system for network environments where communicating decision agents use Graph Neural Networks to provide attack alerts. We also present an attack mitigation system that uses a Reinforcemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…QoS versus energy consumption of distributed services has also been examined experimentallly in [18]. However, the focus on security is more recent and its impact on network management and routing is examined in [10,11,17].…”
Section: Random Neural Network For the Control Of Computer Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…QoS versus energy consumption of distributed services has also been examined experimentallly in [18]. However, the focus on security is more recent and its impact on network management and routing is examined in [10,11,17].…”
Section: Random Neural Network For the Control Of Computer Networkmentioning
confidence: 99%
“…Trust assessing entities can be Attack Detectors or Honeypots, e.g. [17,30]. We employed SYN attack detector presented in [7].…”
Section: Securitymentioning
confidence: 99%
“…In [24] a comprehensive overview of recurrent, convolutional, auto-encoder, and spatial-temporal graph neural network techniques was provided, leading to a taxonomy of GNN processes used in various IoT application domains. In [25,26], agents employing a GNN model were proposed to provide both localized monitoring in IoT networks and feature exchange in a distributed synergistic detection mechanism. This SoA method was implemented in conjunction with an SoA mitigation algorithm and verification tool to construct a holistic approach to security in IoT environments.…”
Section: Previous Work In Anomaly Detection Techniquesmentioning
confidence: 99%
“…For this purpose, a potential approach could be based on the use of graph-based techniques (e.g., graph embedding [128]) where communication endpoints are represented as graph nodes and the interactions are described as the edges. This approach was proposed by [129], which uses techniques based on graph kernels [130] to represent MUD restrictions, or [131], which proposes the use of graph neural networks [132]. Another potential approach to be explored in the coming years is represented by the use of federated learning [94], in which end devices do not share their network traces for traffic analysis purposes, but updates of the model to be learned.…”
Section: F Traffic Analysis Based On Mud Restrictionsmentioning
confidence: 99%