Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
RISE Research Institutes of Sweden, Säkerhet och transport, Elektrifiering och pålitlighet.ORCID-id: 0009-0003-0563-079X
Chalmers University of Technology, Sweden.
Chalmers University of Technology, Sweden.
Clavister, Sweden.
Vise andre og tillknytning
2023 (engelsk)Inngår i: EUROSEC '23: Proceedings of the 16th European Workshop on System Security. May, 2023., Association for Computing Machinery , 2023, s. 44-50Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

With their inherent convenience factor, Internet of Things (IoT) devices have exploded in numbers during the last decade, but at the cost of security. Machine learning (ML) based intrusion detection systems (IDS) are increasingly proving necessary tools for attack detection, but requirements such as extensive data collection and model training make these systems computationally heavy for resource-limited IoT hardware. This paper’s main contribution to the cyber security research field is a demonstration of how a dynamic user-level scheduler can improve the performance of IDS suited for lightweight and data-driven ML algorithms towards IoT. The dynamic user-level scheduler allows for more advanced computations, not intended to be executed on resource-limited IoT units, by enabling parallel model retraining locally on the IoT device without halting the IDS. It eliminates the need for any cloud resources as computations are kept locally at the edge. The experiments showed that the dynamic user-level scheduler provides several advantages compared to a previously developed baseline system. Mainly by substantially increasing the system’s throughput, which reduces the time until attacks are detected, as well as dynamically allocating resources based on attack suspicion.

sted, utgiver, år, opplag, sider
Association for Computing Machinery , 2023. s. 44-50
Serie
EUROSEC ’23
Emneord [en]
model training, anomaly-based intrusion detection system, user-level scheduling, internet of things
HSV kategori
Identifikatorer
URN: urn:nbn:se:ri:diva-64430DOI: 10.1145/3578357.3589460OAI: oai:DiVA.org:ri-64430DiVA, id: diva2:1756572
Konferanse
EUROSEC '23: 16th European Workshop on System Security. 2023
Merknad

The research leading to these results has been partially supported by the Swedish Civil Contingencies Agency (MSB) through the projects RICS2, as well as the CELTIC-NEXTAI-NET-PROTECT (C2019/3-4) project and Clavister.

Tilgjengelig fra: 2023-05-12 Laget: 2023-05-12 Sist oppdatert: 2023-05-12bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekst

Person

Mirzai, Aria

Søk i DiVA

Av forfatter/redaktør
Mirzai, Aria
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 252 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
v. 2.44.0