Chrome Extension
WeChat Mini Program
Use on ChatGLM

Classifying attack traffic in IoT environments via few-shot learning

Giampaolo Bovenzi, Davide Di Monda, Antonio Montieri, Valerio Persico, Antonio Pescape

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS(2024)

Cited 0|Views11
No score
Abstract
The Internet of Things (IoT) is a key enabler for critical systems, but IoT devices are increasingly targeted by cyberattacks due to their diffusion and hardware and software limitations. This calls for designing and evaluating new effective approaches for protecting IoT systems at the network level. While recent proposals based on machine- and deep -learning provide effective solutions to the problem of attack -traffic classification , their adoption is severely challenged by the amount of labeled traffic they require to train the classification models. In fact, this results in the need for collecting and labeling large amounts of malicious traffic, which may be hindered by the nature of the malware possibly generating little and hard -to -capture network activity. To tackle this challenge, we adopt few -shot learning approaches for attack -traffic classification, with the objective to improve detection performance for attack classes with few labeled samples. We leverage advanced deeplearning architectures to perform feature extraction and provide an extensive empirical study-using recent and publicly available datasets-comparing the performance of an ample variety of solutions based on different learning paradigms, and exploring a number of design choices in depth (impact of embedding function, number of classes of attacks, or number of attack samples). In comparison to non -few -shot baselines, we achieve a relative improvement in the F 1 - score ranging from 8% to 27%.
More
Translated text
Key words
Attack-traffic classification,Internet of Things,Deep Learning,Few-shot learning,Network security
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined