오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구

Vol. 34, No. 2, pp. 281-288, 4월. 2024
10.13089/JKIISC.2024.34.2.281, Full Text:
Keywords: Anomaly Detection, Autoencoder, IoT device, Network traffic
Abstract

The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
박승아, 장예진, 김다슬, 한미란, "Autoencoder-Based Anomaly Detection Method for IoT Device Traffics," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 2, pp. 281-288, 2024. DOI: 10.13089/JKIISC.2024.34.2.281.

[ACM Style]
박승아, 장예진, 김다슬, and 한미란. 2024. Autoencoder-Based Anomaly Detection Method for IoT Device Traffics. Journal of The Korea Institute of Information Security and Cryptology, 34, 2, (2024), 281-288. DOI: 10.13089/JKIISC.2024.34.2.281.