Table 11: Comparison of detection results.
TPR FPR
Conventional 0.9999 0.0928
White list 0.9999 0.0570
Customized white list 0.9998 0.0325
between TPR and FPR can be controlled by changing
the granularity of the white list.
6 CONCLUSIONS
In this paper, we proposed a method that combines
a white list created by MUD with machine learning
to detect malware infection in IoT devices. By us-
ing the white list, we can exclude normal commu-
nications that have been misclassified as malware by
machine learning alone from anomaly detection, and
thus reduce false positives. We evaluated the accuracy
of anomaly detection using a dataset of normal and
malware communications, and confirmed that the pro-
posed method reduced the false detection rate. More-
over, the performance varied by changing the rule of
the white list. Future work includes investigating how
to create more effective white lists, applying them
to other machine learning algorithms, and evaluating
them using more practical datasets.
REFERENCES
Abdalla, P. A. and Varol, C. (2020). Testing iot security:
The case study of an ip camera. In 2020 8th Interna-
tional Symposium on Digital Forensics and Security
(ISDFS), pages 1–5. IEEE.
Ahmed, S., Lee, Y., Hyun, S.-H., and Koo, I. (2019). Unsu-
pervised machine learning-based detection of covert
data integrity assault in smart grid networks utilizing
isolation forest. IEEE Transactions on Information
Forensics and Security, 14(10):2765–2777.
Alam, M. S. and Vuong, S. T. (2013). Random forest
classification for detecting android malware. In 2013
IEEE International Conference on Green Computing
and Communications and IEEE Internet of Things and
IEEE Cyber, Physical and Social Computing, pages
663–669. IEEE.
Antonakakis, M., April, T., Bailey, M., Bernhard, M.,
Bursztein, E., Cochran, J., Durumeric, Z., Halderman,
J. A., Invernizzi, L., Kallitsis, M., et al. (2017). Un-
derstanding the mirai botnet. In 26th USENIX Security
Symposium (USENIX Security 17), pages 1093–1110.
Brian, T., Chris, I., Michael, D., Emily, S., Dan, R.,
Matt, C., and the CERT Network Situational Aware-
ness Group Engineering Team (2018). Yaf documen-
tation. https://tools.netsa.cert.org/yaf/yaf.html. Ac-
cessed: 2020-11-17.
Claise, B., Trammell, B., and Aitken, P. (2013). Specifi-
cation of the ip flow information export (ipfix) pro-
tocol for the exchange of flow information. https:
//tools.ietf.org/html/rfc7011. Accessed: 2020-11-17.
Ding, Z. and Fei, M. (2013). An anomaly detection ap-
proach based on isolation forest algorithm for stream-
ing data using sliding window. IFAC Proceedings Vol-
umes, 46(20):12–17.
Doshi, R., Apthorpe, N., and Feamster, N. (2018). Ma-
chine learning ddos detection for consumer internet of
things devices. In 2018 IEEE Security and Privacy
Workshops (SPW), pages 29–35.
Fortino, G., Savaglio, C., Spezzano, G., and Zhou, M.
(2020). Internet of things as system of systems: A
review of methodologies, frameworks, platforms, and
tools. IEEE Transactions on Systems, Man, and Cy-
bernetics: Systems.
Hamza, A., Gharakheili, H. H., Benson, T. A., and Sivara-
man, V. (2019). Detecting volumetric attacks on lot
devices via sdn-based monitoring of mud activity. In
Proceedings of the 2019 ACM Symposium on SDN Re-
search, pages 36–48.
Hamza, A., Ranathunga, D., Gharakheili, H. H., Roughan,
M., and Sivaraman, V. (2018). Clear as mud: gener-
ating, validating and applying iot behavioral profiles.
In Proceedings of the 2018 Workshop on IoT Security
and Privacy, pages 8–14.
Hasan, M., Islam, M. M., Zarif, M. I. I., and Hashem, M.
(2019). Attack and anomaly detection in iot sensors in
iot sites using machine learning approaches. Internet
of Things, 7:100059.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and
Sikdar, B. (2019). A survey on iot cecurity: Applica-
tion areas, security threats, and solution architectures.
IEEE Access, 7:82721–82743.
Jung, O., Smith, P., Magin, J., and Reuter, L. (2019).
Anomaly detection in smart grids based on software
defined networks. In Proceedings of the 8th Interna-
tional Conference on Smart Cities and Green ICT Sys-
tems - SMARTGREENS,, pages 157–164. INSTICC,
SciTePress.
Kimani, K., Oduol, V., and Langat, K. (2019). Cyber se-
curity challenges for iot-based smart grid networks.
International Journal of Critical Infrastructure Pro-
tection, 25:36–49.
Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J.
(2017). Ddos in the iot: Mirai and other botnets. Com-
puter, 50(7):80–84.
Lear, E., Droms, R., and Romascanu, D. (2019). Manufac-
turer usage description specification. https://tools.ietf.
org/html/rfc8520. Accessed: 2020-11-17.
Liu, F. T., Ting, K. M., and Zhou, Z.-H. (2008). Isolation
forest. In 2008 Eighth IEEE International Conference
on Data Mining, pages 413–422. IEEE.
Madeira, R. and Nunes, L. (2016). A machine learning ap-
proach for indirect human presence detection using iot
devices. In 2016 Eleventh International Conference
on Digital Information Management (ICDIM), pages
145–150.
Mizuno, S., Hatada, M., Mori, T., and Goto, S. (2017).
Botdetector: A robust and scalable approach toward
IoTBDS 2021 - 6th International Conference on Internet of Things, Big Data and Security
46