SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Deep Learning Analytics
for IoT Security over a
Configurable Big Data
Platform
Speaker: Angela-Maria Despotopoulou
Research Scientist
Athens Information Technology, Greece
Paper Authors
30/11/2019 2
Stefanos Astaras
sast@ait.gr
Sofoklis Efremidis
sefr@ait.gr
Angela-Maria
Despotopoulou
ades@ait.gr
Nikos Kefalakis
Nikos.KEFALAKIS@intrasoft
-intl.com
John Soldatos
jsol@ait.gr
Presentation Take-Aways
Presentation
Contents
an architectural
framework that
provides a data driven
security monitoring
mechanism for all
layers of an IoT system
deep learning
algorithms tested over a
practical implementation
of the framework, called
Variational
Autoencoders
30/11/2019 3
Contemporary IoT security challenges
Vulnerabilities of smart objects (e.g. hacking of software).
Threats associated with the convergence of Information and
Operational technologies.
Increased legal requirements in complying with Regulations.
New sophisticated ways for conducting large-scale attacks.
Increased
sophistication
of IoT Systems
also means…
A
B
C
D
30/11/2019 4
30/11/2019 5
Deep Learning
30/11/2019 6
Analytics Engine Algorithm
Trains itself using sequences of historical data.
Isolates and stores patterns of suspicious behavior.
Implemented Example:
Variational Autoencoder (VAE)
… when evaluation
suggests an attack is
taking place.
Alerts
… them, with patterns
encountered during
training
Juxtaposes
… new, previously
unknown streams of
measurements from IoT
devices
Monitors
Autoencoders
Conceptually separated into the
encoder and the decoder
(similarly to image
compression).
Part of the information is lost
during the encoding process
and cannot be recovered when
decoding.
Find the pair that keeps the
maximum of information when
encoding and, so, has the
minimum of reconstruction error
when decoding.
Variational Autoencoder (VAE)
an autoencoder whose training
is regularized to avoid
overfitting to the training
dataset, while performing
poorly in new unknown
datasets.
Structure Anomalies Indicator Purpose A Step Further
30/11/2019 7
Benefits of VAE
30/11/2019 8
The Model can be fitted to new abnormal
cases without retraining the whole dataset.
The Model can reconstruct missing
features in the input data.
The Model can detect abnormalities that
had not been encountered during training.
The Model is efficient on data of low
dimensionality and isolated attacks.
To validate the performance of
the approach and its integration
in the platform, we have trained
autoencoders of various
complexities with various
datasets. Here follow two use
cases, one for connected car
datasets and one for socially
assistive robots.
02
03
04
01
Connected Cars Use Case
The car behavior is represented as a set of data sequences, for example measurements from sensors
installed on the Vehicle that count its speed, fuel or steering angle.
The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set.
30/11/2019 9
Socially Assistive Robots Case
The dataset contained sensor and context reports from a Robot: motor readings, gesture reports,
event timestamps.
In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%.
30/11/2019 10
Acknowledgements
30/11/2019 11
This work has been carried out in the scope of the H2020 SecureIoT project, which
is funded by the European Commission in the scope of its Horizon 2020 research
and innovation programme (contract number 779899). The authors acknowledge
valuable help and contributions from all partners of the project.
THANK YOU
Angela-Maria Despotopoulou
Athens Information Technology, Greece

Weitere ähnliche Inhalte

Was ist angesagt?

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehiclessulaiman_karim
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...IJITCA Journal
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Zac Darcy
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)acijjournal
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...IJCSES Journal
 
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...IJITCA Journal
 

Was ist angesagt? (19)

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
CAIJ
CAIJCAIJ
CAIJ
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Ijaca
IjacaIjaca
Ijaca
 
IoT won't work without AI
IoT won't work without AIIoT won't work without AI
IoT won't work without AI
 
Ijamc
IjamcIjamc
Ijamc
 
Ijaca
IjacaIjaca
Ijaca
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
 
Ijaca
IjacaIjaca
Ijaca
 
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...
 
Ijaca
IjacaIjaca
Ijaca
 
Ijaca
IjacaIjaca
Ijaca
 

Ähnlich wie Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningVenkat Projects
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidentsijtsrd
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020shoaibulhassanuos
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptxMacZain
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...Rick Bouter
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Capgemini
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine LearningIRJET Journal
 

Ähnlich wie Deep Learning Analytics for IoT Security over a Configurable Big Data Platform (20)

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptx
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine Learning
 

Kürzlich hochgeladen

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Kürzlich hochgeladen (20)

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 

Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

  • 1. Deep Learning Analytics for IoT Security over a Configurable Big Data Platform Speaker: Angela-Maria Despotopoulou Research Scientist Athens Information Technology, Greece
  • 2. Paper Authors 30/11/2019 2 Stefanos Astaras sast@ait.gr Sofoklis Efremidis sefr@ait.gr Angela-Maria Despotopoulou ades@ait.gr Nikos Kefalakis Nikos.KEFALAKIS@intrasoft -intl.com John Soldatos jsol@ait.gr
  • 3. Presentation Take-Aways Presentation Contents an architectural framework that provides a data driven security monitoring mechanism for all layers of an IoT system deep learning algorithms tested over a practical implementation of the framework, called Variational Autoencoders 30/11/2019 3
  • 4. Contemporary IoT security challenges Vulnerabilities of smart objects (e.g. hacking of software). Threats associated with the convergence of Information and Operational technologies. Increased legal requirements in complying with Regulations. New sophisticated ways for conducting large-scale attacks. Increased sophistication of IoT Systems also means… A B C D 30/11/2019 4
  • 6. Deep Learning 30/11/2019 6 Analytics Engine Algorithm Trains itself using sequences of historical data. Isolates and stores patterns of suspicious behavior. Implemented Example: Variational Autoencoder (VAE) … when evaluation suggests an attack is taking place. Alerts … them, with patterns encountered during training Juxtaposes … new, previously unknown streams of measurements from IoT devices Monitors
  • 7. Autoencoders Conceptually separated into the encoder and the decoder (similarly to image compression). Part of the information is lost during the encoding process and cannot be recovered when decoding. Find the pair that keeps the maximum of information when encoding and, so, has the minimum of reconstruction error when decoding. Variational Autoencoder (VAE) an autoencoder whose training is regularized to avoid overfitting to the training dataset, while performing poorly in new unknown datasets. Structure Anomalies Indicator Purpose A Step Further 30/11/2019 7
  • 8. Benefits of VAE 30/11/2019 8 The Model can be fitted to new abnormal cases without retraining the whole dataset. The Model can reconstruct missing features in the input data. The Model can detect abnormalities that had not been encountered during training. The Model is efficient on data of low dimensionality and isolated attacks. To validate the performance of the approach and its integration in the platform, we have trained autoencoders of various complexities with various datasets. Here follow two use cases, one for connected car datasets and one for socially assistive robots. 02 03 04 01
  • 9. Connected Cars Use Case The car behavior is represented as a set of data sequences, for example measurements from sensors installed on the Vehicle that count its speed, fuel or steering angle. The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set. 30/11/2019 9
  • 10. Socially Assistive Robots Case The dataset contained sensor and context reports from a Robot: motor readings, gesture reports, event timestamps. In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%. 30/11/2019 10
  • 11. Acknowledgements 30/11/2019 11 This work has been carried out in the scope of the H2020 SecureIoT project, which is funded by the European Commission in the scope of its Horizon 2020 research and innovation programme (contract number 779899). The authors acknowledge valuable help and contributions from all partners of the project.
  • 12. THANK YOU Angela-Maria Despotopoulou Athens Information Technology, Greece