2020
DOI: 10.48550/arxiv.2011.08605
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Case for Retraining of ML Models for IoT Device Identification at the Edge

Roman Kolcun,
Diana Andreea Popescu,
Vadim Safronov
et al.

Abstract: Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, using resources available at the edge of the network.In this paper, we compare the accuracy of five different machine learning models (tree-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…When a fresh set of M/A tables is generated by the control plane, these rules are then written to the data plane, forming new inference thresholds and completing the update process. This approach differs from the classical model retraining [5] in terms of update location, model objective, and update requirements. In the classical method, retraining and updating the model involves loading the trained model file onto processors like CPU.…”
Section: Model Remapping and Shadow Table Updatesmentioning
confidence: 99%
See 1 more Smart Citation
“…When a fresh set of M/A tables is generated by the control plane, these rules are then written to the data plane, forming new inference thresholds and completing the update process. This approach differs from the classical model retraining [5] in terms of update location, model objective, and update requirements. In the classical method, retraining and updating the model involves loading the trained model file onto processors like CPU.…”
Section: Model Remapping and Shadow Table Updatesmentioning
confidence: 99%
“…IoT gateways (with wireless/wired interface) close to end devices play a vital role in defending against emerging threats before they spread. However, to counter emerging attacks in gateway, state-of-the-art security measures focus primarily on accurate detection through methods like online learning or model retraining [4,5]. This leaves a gap in fast and flexible action enforcement against detected anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…These following batch of papers widely elaborated feature extraction approaches to form input vectors [54,59,62,131,132] (see Table 8).…”
Section: One-dimensional Cnn Inputmentioning
confidence: 99%
“…Yet another publication written by Kolcun et al utilized vector of features as the CNN entry to deal with the traffic classification challenge in IoT [132]. There are a few models proposed, but only one meets the requirements of this review, the 4-Layer CDM.…”
Section: One-dimensional Cnn Inputmentioning
confidence: 99%