that, due to the semantic gap between attack activity
and its footprint in terms of packets, it is difficult for a
traditional detector to distinguish benign and anoma-
lous activity. We solve this problem by lifting the
analysis at the level of user activities, i.e. discrete,
basic operations a user can initiate by remotely oper-
ating the device (e.g., streaming video from a smart
camera). A detector working at the level of activities
can easily identify abnormal user behavior (e.g., use
of functionality not normally triggered by the legiti-
mate owner).
The first challenge we tackle is that, for our de-
tector to work, activities must first be inferred from
network traffic. Establishing such mapping requires
extracting a large amount of traffic from a given de-
vice, while labeling each flow with the activity that
caused it. For the purpose, we built an infrastructure
enabling us to trigger a large number of scripted ac-
tivities for a variety of IoT devices, while capturing
traffic labeled with the corresponding activity. This
resulted in a 19.8-GB traffic dataset which we plan
to release to foster further experimentation. Once
labeled traffic is available, a reliable mapping must
be established between flows and activities. For this
purpose, we train a random-forest classifier to map
packet sequences to activities. Finally, patterns of de-
vice use are user-specific, and should be learned, ide-
ally in an unsupervised fashion. We use clustering to
identify recurring sequences of user activities, and se-
quences of activities which deviate from the expected
behavior.
Preliminary results are promising: we report accu-
racy in the range of 86%-98% for activity identifica-
tion. We also built a proof of concept tool to perform
anomaly detection, and present an example scenario
to demonstrate its working.
2 RELATED WORK
Anomaly detection for IoT devices is a widely re-
searched area (Chandola et al., 2009). Approaches
based on both supervised learning (Alrashdi et al.,
2019; Pacheco et al., 2019) and unsupervised learn-
ing (Bhatia et al., 2019; Hoang and Duong Nguyen,
2019; Alhaidari and Zohdy, 2019) have been pro-
posed. Furthermore, (Hamza et al., 2018) propose
signature-based detection based on manufacturer us-
age descriptions. (Jung et al., 2020; Myridakis et al.,
2017) build a power consumption model using Con-
volution Neural Networks (CNNs) to detect IoT de-
vices turned into botnet. Finally, (Haefner and Ray,
2019) proposes a complexity metric for IoT devices
which is used to fine tune the anomaly detection
algorithm for each device based on its complexity.
Regardless of the specifics, the approaches above
work at the network level, that is, they fail to detect
anomaly in higher level user activities.
Other works investigate orthogonal aspects of IoT
network security. IoT device fingerprinting (Mei-
dan et al., 2017; Ortiz et al., 2019; Bezawada et al.,
2018; Msadek et al., 2019; Miettinen et al., 2017;
Thangavelu et al., 2019; Miettinen et al., 2017)
uses various machine learning classifiers to generate
unique network behavioral patterns of IoT devices.
However, these works do not focus on user activity
identification. (Ren et al., 2019) is a comprehensive
study of privacy in IoT devices. (Acar et al., 2018)
looks at privacy leakage from network traffic and sug-
gests mitigation techniques such as traffic shaping.
Closer to our goal, (Wang et al., 2020) identi-
fies the voice commands given to Amazon Echo and
Google home using deep learning. This work focuses
on a specific class of user activity and device. In
(Apthorpe et al., 2017), the authors identify activities
of IoT devices using Random Forest and K-Nearest
Neighbor (KNN) classifiers. However, the amount of
traffic data collected is small and further experimenta-
tion with large datasets is required to make conclusive
statements.
3 OUR APPROACH
3.1 Threat Model
In this work, we focus on an attacker who acquires
the credentials of the legitimate user and controls the
IoT devices in unintended ways. This includes acti-
vating/deactivating a device, performing various op-
erations, and configuring it in a manner that compro-
mises user security/privacy. Conventional anomaly
detection based on analyzing network flows may be
unable to distinguish between normal and anomalous
activities. Our work aims to classify user activities
based on network traffic and identify if the activity
pattern of the user has changed. We make two as-
sumption based on previous work – 1. IoT devices
can be distinguished from conventional computing
devices (e.g. - laptop) and 2. IoT devices can be fin-
gerprinted to identify them.
3.2 Experimental Setup
Conventional network anomaly detection techniques
focus on distinguishing normal and anomalous flows.
Our work, in contrast, focuses on distinguishing be-
tween normal and anomalous activities performed by
IoTBDS 2021 - 6th International Conference on Internet of Things, Big Data and Security
310