<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-4-128-137</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-219</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ТРУДЫ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>YOUNG SCHOLARS RESEARCH</subject></subj-group></article-categories><title-group><article-title>Обнаружение аномалий в трафике устройств Интернета вещей</article-title><trans-title-group xml:lang="en"><trans-title>Detection of Anomalies in the Traffic of IoT Devices</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-2263-2426</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Муренин</surname><given-names>И. Н.</given-names></name><name name-style="western" xml:lang="en"><surname>Murenin</surname><given-names>I.</given-names></name></name-alternatives><bio xml:lang="ru"><p>младший научный сотрудник лаборатории проблем компьютерной безопасности Санкт-Петербургского института информатики и автоматизации РАН</p><p>Санкт-Петербург, 199178, Российская Федерация</p></bio><bio xml:lang="en"><p>St. Petersburg, 199178, Russian Federation</p></bio><email xlink:type="simple">imurenin@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский институт информатики и автоматизации РАН<country>Россия</country></aff><aff xml:lang="en">Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Science<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>29</day><month>12</month><year>2021</year></pub-date><volume>7</volume><issue>4</issue><fpage>128</fpage><lpage>137</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Муренин И.Н., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Муренин И.Н.</copyright-holder><copyright-holder xml:lang="en">Murenin I.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/219">https://tuzs.sut.ru/jour/article/view/219</self-uri><abstract><p>В статье предложено искать аномалии в трафике устройств Интернета вещей на основе анализа временных рядов и оценки нормального и аномального поведения с помощью статистических методов. Основная цель заключается в комбинировании статистических методов для обнаружения аномалий с использованием неразмеченных данных и построении ключевых характеристик профилей устройств. В рамках данного подхода разработаны и реализованы методики построения признаков и границ нормального поведения, а также обнаружения аномалий на основе анализа трафика. Для их оценки использовалась генерация журналов поступающих с устройств событий с аномальной разметкой. Эксперименты показали, что наилучшие результаты по обнаружению аномалий в трафике устройств Интернета вещей дает метод выявления выбросов с помощью GESD-теста.</p></abstract><trans-abstract xml:lang="en"><p>The article proposes an approach to finding anomalies in the traffic of IoT devices based on time series analysis and assessing normal and abnormal behavior using statistical methods. The main goal of the proposed approach is to combine statistical methods for detecting anomalies using unlabeled data and plotting key characteristics of device profiles. Within this approach the following techniques for traffic analysis has been developed and implemented: a technique for a feature extraction, a normal behavior boundary building technique and an anomaly detection technique. To evaluate the proposed approach, we used a technique for generating event logs from devices with the generation of anomalous markup. The experiments shown that the GESD-test gives the best results for anomaly detection in IoT traffic.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>обнаружение аномалий</kwd><kwd>анализ временных рядов</kwd><kwd>Интернет вещей</kwd><kwd>сетевой трафик</kwd><kwd>статистические методы</kwd></kwd-group><kwd-group xml:lang="en"><kwd>anomaly detection</kwd><kwd>time series analysis</kwd><kwd>IoT</kwd><kwd>network traffic</kwd><kwd>statistical methods</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Работа подготовлена при частичной финансовой поддержке бюджетной темы 0073-2019-0002</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Tariqa N., Khan F.A., Asimc M. Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis // Procedia Computer Science. 2021. Vol. 191. PP. 425‒430. DOI:10.1016/j.procs.2021.07.053</mixed-citation><mixed-citation xml:lang="en">Tariqa N., Khan F.A., Asimc M. Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis. Procedia Computer Science. 2021;191:425‒430. DOI:10.1016/j.procs.2021.07.053</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Sengupta J., Ruj S., Das Bit S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT // Journal of Network and Computer Applications. 2019. Vol. 149. DOI:10.1016/j.jnca.2019.102481</mixed-citation><mixed-citation xml:lang="en">Sengupta J., Ruj S., Das Bit S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications. 2019;149. DOI:10.1016/j.jnca.2019.102481</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Котенко И.В., Степашкин М.В., Богданов В.С. Архитектуры и модели компонентов активного анализа защищенности на основе имитации действий злоумышленников // Проблемы информационной безопасности. Компьютерные системы. 2006. № 2. С. 7‒24.</mixed-citation><mixed-citation xml:lang="en">Kotenko I.V., Stepashkin M.V., Bogdanov V.S. Architectures and Models of Active Vulnerabilities Analysis Based on Simulation of Malefactors' Actions. Information Security Problems. Computer Systems. 2006;2:7‒24 (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Котенко И.В., Десницкий В.А., Чечулин А.А. Исследование технологии проектирования безопасных встроенных систем в проекте Европейского сообщества SecFutur // Защита информации. Инсайд. 2011. № 3(39). С. 68‒75.</mixed-citation><mixed-citation xml:lang="en">Kotenko I.V., Desnitskiy V.A., Chechulin A.A. Research of technology for designing safe embedded systems in the project of the European Community SecFutur. Zaŝita informacii. Inside. 2011;3(39):68‒75.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Enoch S.Y., Ge M., Hong J.B., Kim D.S. Model-based Cybersecurity Analysis: Past Work and Future Directions. Cornell University, 2021. URL: https://arxiv.org/abs/2105.08459 (дата обращения 21.12.2021)</mixed-citation><mixed-citation xml:lang="en">Enoch S.Y., Ge M., Hong J.B., Kim D.S. Model-based Cybersecurity Analysis: Past Work and Future Directions. Cornell University; 2021. Available from: https://arxiv.org/abs/2105.08459 [Accessed 21th December 2021]</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Torres N., Pinto P., Lopes S.I. Security Vulnerabilities in LPWANs ‒ An Attack Vector Analysis for the IoT Ecosystem // Applied Sciences. 2021. Vol. 11. Iss. 7. DOI:10.3390/app11073176</mixed-citation><mixed-citation xml:lang="en">Torres N., Pinto P., Lopes S.I. Security Vulnerabilities in LPWANs ‒ An Attack Vector Analysis for the IoT Ecosystem. Applied Sciences. 2021;11(7). DOI:10.3390/app11073176</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Alansari Z., Anuar N.B., Kamsin A., Belgaum M.R., Alshaer J., Soomro S., et al. Internet of Things: Infrastructure, Architecture, Security and Privacy // Proceedings of the International Conference on Computing, Electronics &amp; Communications Engineering (iCCECE, Southend, UK, 6‒17 August 2018). IEEE, 2018. DOI:10.1109/iCCECOME.2018.8658516</mixed-citation><mixed-citation xml:lang="en">Alansari Z., Anuar N.B., Kamsin A., Belgaum M.R., Alshaer J., Soomro S., et al. Internet of Things: Infrastructure, Architecture, Security and Privacy. Proceedings of the International Conference on Computing, Electronics &amp; Communications Engineering, iCCECE, 6‒17 August 2018, Southend, UK. IEEE; 2018. DOI:10.1109/iCCECOME.2018.8658516</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Hamza A., Gharakheili H.H., Sivaraman V. IoT Network Security: Requirements, Threats, and Countermeasures. Cornell University, 2020. URL: https://arxiv.org/abs/2008.09339 (дата обращения 21.12.2021)</mixed-citation><mixed-citation xml:lang="en">Hamza A., Gharakheili H.H., Sivaraman V. IoT Network Security: Requirements, Threats, and Countermeasures. Cornell University, 2020. Available from: https://arxiv.org/abs/2008.09339 [Accessed 21th December 2021]</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Bouazza H., Zohra L.F., Said B. Integration of Internet of Things and Social Network: Social IoT General Review // Proceedings of the First International Conference on Computing (ICC 2019, Riyadh, Saudi Arabia, 10–12 December 2019) on Advances in Data Science, Cyber Security and IT Applications. Communications in Computer and Information Science. Vol. 1098. Cham: Springer, 2019. PP. 312‒324. DOI:10.1007/978-3-030-36368-0_26</mixed-citation><mixed-citation xml:lang="en">Bouazza H., Zohra L.F., Said B. Integration of Internet of Things and Social Network: Social IoT General Review. Proceedings of the First International Conference on Computing, ICC 2019, 10–12 December 2019, Riyadh, Saudi Arabia on Advances in Data Science, Cyber Security and IT Applications. Communications in Computer and Information Science. Cham: Springer; 2019. vol.1098. p.312‒324. DOI:10.1007/978-3-030-36368-0_26</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Ali O., Ishak M.K., Bhatti M.K.L. Emerging IoT domains, current standings and open research challenges: a review // PeerJ Computer Science. 2021. DOI:10.7717/peerj-cs.659</mixed-citation><mixed-citation xml:lang="en">Ali O., Ishak M.K., Bhatti M.K.L. Emerging IoT domains, current standings and open research challenges: a review. PeerJ Computer Science. 2021. DOI:10.7717/peerj-cs.659</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Nguyen-An H., Silverston T., Yamazaki T., Miyoshi T. IoT Traffic: Modeling and Measurement Experiments // IoT. 2021. Vol 2(1). PP. 140‒162. DOI:10.3390/iot2010008</mixed-citation><mixed-citation xml:lang="en">Nguyen-An H., Silverston T., Yamazaki T., Miyoshi T. IoT Traffic: Modeling and Measurement Experiments. IoT. 2021;2(1):140‒162. DOI:10.3390/iot2010008</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Charyyev B., Gunes M.H. Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes // Proceedings of the Global Communications Conference (GLOBECOM, Taipei, Taiwan, 7‒11 December 2020). IEEE, 2020. DOI:10.1109/GLOBECOM42002.2020.9322559</mixed-citation><mixed-citation xml:lang="en">Charyyev B., Gunes M.H. Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes. Proceedings of the Global Communications Conference, GLOBECOM, 7‒11 December 2020, Taipei, Taiwan. IEEE; 2020. DOI:10.1109/GLOBECOM 42002.2020.9322559</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Garlisi D., Martino A., Zouwayhed J., Pourrahim J., Cuomo F. Exploratory approach for network behavior clustering in LoRaWAN // Journal of Ambient Intelligence and Humanized Computing. 2021. DOI:10.1007/s12652-021-03121-z</mixed-citation><mixed-citation xml:lang="en">Garlisi D., Martino A., Zouwayhed J., Pourrahim J., Cuomo F. Exploratory approach for network behavior clustering in LoRaWAN. Journal of Ambient Intelligence and Humanized Computing. 2021. DOI:10.1007/s12652-021-03121-z</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Fu C., Zeng Q., Du X. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes // Proceedings of the 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2021. PP. 4223‒4240. URL: https://www.usenix.org/conference/usenixsecurity21/presentation/fu-chenglong (дата обращения 21.12.2021)</mixed-citation><mixed-citation xml:lang="en">Fu C., Zeng Q., Du X. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. Proceedings of the 30th USENIX Security Symposium (USENIX Security 21). USENIX Association; 2021. p.4223‒4240. Available from: https://www.usenix.org/conference/usenixsecurity21/presentation/fu-chenglong [Accessed 21th December 2021]</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Nicheporuk A., Nicheporuk A., Sachenko A., Sachenko O., Kazantsev A. A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication // Proceedings of the 2nd International Workshop on Intelligent Information Technologies &amp; Systems of Information Security with CEUR-WS (IntelITSIS, 2021, Khmelnytskyi, Ukraine, 24–26 March 2021). URL: http://ceur-ws.org/Vol-2853/paper44.pdf (дата обращения 21.12.2021)</mixed-citation><mixed-citation xml:lang="en">Nicheporuk A., Nicheporuk A., Sachenko A., Sachenko O., Kazantsev A. A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication. Proceedings of the 2nd International Workshop on Intelligent Information Technologies &amp; Systems of Information Security with CEUR-WS, IntelITSIS, 2021, 24–26 March 2021, Khmelnytskyi, Ukraine. Available from: http://ceur-ws.org/Vol-2853/paper44.pdf [Accessed 21th December 2021]</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Bhatia R., Benno S., Esteban J., Lakshman T.V., Grogan J. Unsupervised machine learning for network-centric anomaly detection in IoT // Proceedings of the 3rd ACM CoNEXT Workshop on Big Data, Machine Learning and Artificial Intelli-gence for Data Communication Networks (Big-DAMA '19). New York: Association for Computing Machinery, 2019. PP. 42‒28. doi:10.1145/3359992.3366641</mixed-citation><mixed-citation xml:lang="en">Bhatia R., Benno S., Esteban J., Lakshman T.V., Grogan J. Unsupervised machine learning for network-centric anomaly detection in IoT // Proceedings of the 3rd ACM CoNEXT Workshop on Big Data, Machine Learning and Artificial Intelligence for Data Communication Networks (Big-DAMA '19). New York: Association for Computing Machinery, 2019. PP. 42‒28. doi:10.1145/3359992.3366641</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Nõmm S., Bahşi H. Unsupervised Anomaly Based Botnet Detection in IoT Networks // Proceedings of the 17th International Conference on Machine Learning and Applications (ICMLA, Orlando, USA, 17‒20 December 2018). IEEE, 2018. DOI:10.1109/ICMLA.2018.00171</mixed-citation><mixed-citation xml:lang="en">Nõmm S., Bahşi H. Unsupervised Anomaly Based Botnet Detection in IoT Networks // Proceedings of the 17th Inter-national Conference on Machine Learning and Applications, ICMLA, 17‒20 December 2018, Orlando, USA. IEEE, 2018. DOI:10.1109/ICMLA.2018.00171</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
