{"id":198,"date":"2018-11-09T16:21:11","date_gmt":"2018-11-09T16:21:11","guid":{"rendered":"https:\/\/decent.future-iot.org\/?p=198"},"modified":"2019-02-10T16:24:42","modified_gmt":"2019-02-10T16:24:42","slug":"all-eyes-on-you-distributed-multi-dimensional-iot-microservice-anomaly-detection","status":"publish","type":"post","link":"https:\/\/decent.future-iot.org\/index.php\/2018\/11\/09\/all-eyes-on-you-distributed-multi-dimensional-iot-microservice-anomaly-detection\/","title":{"rendered":"All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection"},"content":{"rendered":"<!-- VideographyWP Plugin Message: Automatic video embedding prevented by plugin options. -->\n\n<p>TUM published a new article about securing the IoT at the 14th International Conference on Network and Service Management (CNSM)!<\/p>\n\n\n\n<p>The Internet of Things (IoT) is a Distributed System<br> of cooperating Microservices (\u00b5Ss). IoT services manage devices<br> that monitor and control their environments. The interaction of<br> the IoT with the physical environment creates strong security,<br> privacy, and safety implications. It makes providing adequate<br> security for IoT \u00b5Ss essential. However, the complexity of IoT<br> services makes detecting anomalous behavior difficult.<br><\/p>\n\n\n\n<p> We present a machine-learning based approach for modeling<br> IoT service behavior by only observing inter-service communication. Our algorithm continuously learns \u00b5S models on distributed<br> IoT nodes within an IoT site. Combining the learned models<br> within and in-between IoT sites converges our \u00b5S models within<br> short time. Sharing the resulting stable models among compute<br> nodes enables good anomaly detection.<br><\/p>\n\n\n\n<p>As one application, firewalling IoT \u00b5Ss becomes possible. Combining our autonomous \u00b5S modeling with firewalling enables<br> retrofitting security to existing IoT installations. We enable<br> retrofitting access control to existing non-secure IoT installations.<br> Our proposed approach is resource efficient, matching the<br> requirements of the IoT. To evaluate the quality of our proposed<br> algorithm, we show its behavior for a set of common IoT attacks.<br> We evaluate how domain knowledge enables us to decorrelate<br> events on a node, and how adding context features improves the<br> detection rate.<\/p>\n\n\n\n<p>You can find the article here:<\/p>\n\n\n\n<p><a href=\"https:\/\/s2labs.org\/download\/publications\/2018-11_CNSM_All_Eyes_On_You_pahl.pdf\">Pahl, Marc-Oliver and Aubet, Francois-Xavier, &#8220;All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection,&#8221; in 2018 14th International Conference on Network and Service Management (CNSM) (CNSM 2018), November 2018<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TUM published a new article about securing the IoT at the 14th International Conference on Network and Service Management (CNSM)! The Internet of Things (IoT)<\/p>\n","protected":false},"author":2,"featured_media":199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"_links":{"self":[{"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/posts\/198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":1,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions"}],"predecessor-version":[{"id":200,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions\/200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/media\/199"}],"wp:attachment":[{"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/categories?post=198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/decent.future-iot.org\/index.php\/wp-json\/wp\/v2\/tags?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}