City Research Online

Technique for IoT cyberattacks detection based on the energy consumption analysis

Bobrovnikova, K., Lysenko, S., Popov, P. T. ORCID: 0000-0002-3434-5272, Denysiuk, D. and Goroshko, A. (2021). Technique for IoT cyberattacks detection based on the energy consumption analysis. CEUR Workshop Proceedings, 2853, ISSN 1613-0073

Abstract

Today Smart Home is a system for managing the basic life support processes of both small systems (commercial, office premises, apartments, cottages) and large automated complexes (commercial and industrial complexes). One of the important tasks to be solved by the concept of a modern Smart Home is the problem of preventing the malware spread and the usage of IoT infrastructure. One of the possible approaches for abnormal behavior of the IoT devices and IoT cyberattack detection is the monitoring of the energy consumption. Thus, an effective control and monitoring of heating, ventilation, air conditioning, more efficient use of traditional appliances and the introduction of energy-efficient equipment in the building are important to ensure and decision making in the terms of cybersecurity. In addition, improving the efficiency of energy management and monitoring is the approach to increasing effectiveness of the IoT cyberattack detection in the IoT infrastructure. The paper presents a technique for IoT attacks detection based on the IoT devices energy consumption analysis, which take into account the energy consumption related user's preference modes. With aim to improve the accuracy of IoT cyberattacks detection and localize the IoT malware on these IoT devices the IoT software opcodes sequences analysis is applied. The proposed approach allows detecting the performing of the IoT devices such attacks, for example, as DoS/DDoS with high efficiency, at a level of about 99.88% and localizing malicious IoT software on these devices with accuracy of about 99.66%.

Publication Type: Conference or Workshop Item (Paper)
Additional Information: © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
Publisher Keywords: Internet of things, cyberattack, DDoS, malware detection, energy consumption, sequential pattern mining, opcodes analysis
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Departments: School of Mathematics, Computer Science & Engineering > Computer Science > Software Reliability
Date available in CRO: 13 Jul 2021 07:29
Date deposited: 13 July 2021
Date of first online publication: 23 April 2021
URI: https://openaccess.city.ac.uk/id/eprint/26372
[img]
Preview
Text - Published Version
Available under License Creative Commons: Attribution International Public License 4.0.

Download (586kB) | Preview

Export

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login