Logo PTI Logo FedCSIS

Proceedings of the 18th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 35

Tackling Variable-length Sequences with High-cardinality Features in Cyber-attack Detection

DOI: http://dx.doi.org/10.15439/2023F2385

Citation: Proceedings of the 18th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 35, pages 12951299 ()

Full text

Abstract. Internet of Things (IoT) based systems are vulnerable to various cyber-attacks and need advanced and smart techniques in order to achieve their security. In the FedCSIS 2023 big-data competition, participants are asked to construct scoring models to detect whether anomalous operating systems were under attack by using logs from IoT devices. These log files are variable-length sequences with high cardinality features. Through in-depth and detailed analysis, we find out concise and efficient methods to handle these huge volumes, variety, and veracity of data. On the basis of this, we create detection rules using the fundamental knowledge of mathematical statistics and train gradient boosting machine (GBM) based classifier for attack detection. Experimental and competition results prove the effectiveness of our proposed methods. Our final AUC score is 0.9999 on the private leaderboard.

References

  1. IoT Cybersecurity in 2023: Importance & Tips To Deal With Attacks. https://research.aimultiple.com/iot-cybersecurity/
  2. Michał Jarosz, Konrad Wrona, Zbigniew Zieliński. Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices. Proceedings of the 17th Conference on Computer Science and Intelligence Systems, ACSIS, Vol. 30, pages 617-625 (2022). http://dx.doi.org/http:// dx.doi.org/10.15439/2022F169.
  3. FedCSIS 2023 Challenge: Cybersecurity Threat Detection in the Behavior of IoT Devices. https://knowledgepit.ai/fedcsis-2023-challenge/
  4. Eyad Kannout, Michał Grodzki, Marek Grzegorowski. Considering various aspects of models’ quality in the ML pipeline - application in the logistics sector. Proceedings of the 17th Conference on Computer Science and Intelligence Systems. ACSIS, Vol. 30, pages 403-412 (2022). http://dx.doi.org/http://dx.doi.org/10.15439/2022F296.
  5. F. Hussain, R. Hussain, S. A. Hassan and E. Hossain. Machine Learning in IoT Security: Current Solutions and Future Challenges. in IEEE Communications Surveys & Tutorials, vol.22, no.3, pp.1686-1721, 2020. http://dx.doi.org/https://doi.org/10.1109/COMST.2020.2986444.
  6. Martin Kodys, Zhi Lu, Kar Wai Fok, et al. Intrusion Detection in Internet of Things using Convolutional Neural Network. https://arxiv.org/pdf/2211.10062.pdf. http://dx.doi.org/https://doi.org/10.1109/ PST52912.2021.9647828.
  7. Kumar Saurabh, Saksham Sood, P. Aditya Kumar, et al. LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks. https://arxiv.org/pdf/2207.00424.pdf. http://dx.doi.org/https:// doi.org/10.48550/arXiv.2207.00424
  8. Chang Lin. Predicting Frags in Tactic Games using Machine Learning Techniques and Intuitive Knowledge (in press). In Proceedings of the 2023 IEEE International Conference on Multimedia and Expo. IEEE, 2023.
  9. Bogusław Cyganek. Modern C++ in the era of new technologies and challenges - why and how to teach modern C++?. Proceedings of the 17th Conference on Computer Science and Intelligence Systems. ACSIS, Vol. 30, pages 35-40 (2022). http://dx.doi.org/http://dx.doi.org/ 10.15439/2022F308.