Skip to main navigation Skip to search Skip to main content

IDSA-IoT: An Intrusion Detection System Architecture for IoT Networks

  • Guilherme Weigert Cassales
  • , Hermes Senger
  • , Elaine Ribeiro De Faria
  • , Albert Bifet

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Internet of Things (IoT) allows large amounts and variety of devices to connect, interact and exchange data. The IoT network creates numerous opportunities for novel attacks that can compromise information and systems integrity. Intrusion detection systems have been studied over two decades, mostly employing traditional data mining and machine learning techniques that require an offline phase for model training on large amounts of data. This paper presents three data stream novelty detection techniques applied to the intrusion detection problem and proposes IDSA-IoT, a novel implementation architecture, which combines the use of resources at the edge of the network and a public cloud. After an extensive empirical evaluation, results show that it is possible to identify new attack patterns soon after their emergence and to adapt the models in an efficient way.

Original languageEnglish
Title of host publicationProceedings - IEEE Symposium on Computers and Communications
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728129990
DOIs
Publication statusPublished - 1 Jun 2019
Externally publishedYes
Event2019 IEEE Symposium on Computers and Communications, ISCC 2019 - Barcelona, Spain
Duration: 29 Jun 20193 Jul 2019

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
Volume2019-June
ISSN (Print)1530-1346

Conference

Conference2019 IEEE Symposium on Computers and Communications, ISCC 2019
Country/TerritorySpain
CityBarcelona
Period29/06/193/07/19

Fingerprint

Dive into the research topics of 'IDSA-IoT: An Intrusion Detection System Architecture for IoT Networks'. Together they form a unique fingerprint.

Cite this