SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Secure and Safe Internet ofThings (SerIoT)
1 Horizon 2020, Project No. 780139
Traffic Generator and
Detector of malicious traffic
S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos (ICCS) and E. Gelenbe (IITIS)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Relevant References
2 Horizon 2020, Project No. 780139
 S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos and E. Gelenbe,
“Neural network architectures for the detection of SYN flood
attacks,”
in IoT systems, PETRA 2020: The 13th International Conference on
PErvasive Technologies Related to Assistive Technologies, pp. 69:1-
69:4 (2020), ACM https://dl.acm.org/doi/10.1145/3389189.3398000
 Prior Related Work:
 O. Brun, Y. Yin and E. Gelenbe,
“ Deep Learning with dense random neural network for detecting
attacks against IoT-connected home environments, “
Procedia Computer Science 134: 458-463 (2018)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
3 Horizon 2020, Project No. 780139
Use of VirtualBox:
Creation of a number of VMs (18.04 compatibility)
NAT network configuration enables the created VMs to connect to the Internet
VM-1 : Client IP->192.168.56.100 script b9generator.py
VM-2 : Server IP->192.168.56.101 script server.py
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
4 Horizon 2020, Project No. 780139
FIRST COMMUNICATION CAPTURED
Two scripts running on each VM (server.py on server VM, b9generator.py on client
VM)
400 Full TCP connections established
Communication captured using Wireshark -> b9traffic.pcap
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
5 Horizon 2020, Project No. 780139
All the traffic generated by the bot network: captured by Wireshark
Realtimesenario.pcap
*observation: The server was running short on its resources and its capability to
handle requests was massively inhibited
Realtimesenario.pcap :annotated as such -> 5sec windows and every window is
assigned to a metric (half opened TCP connections)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
6 Horizon 2020, Project No. 780139
 After a while the attack
is in full effect.
Therefore the ability of
the server to handle
requests is massively
inhibited. So, Wireshark
shows a number of
retransmissions.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Neural Network Architectures for the Detection
of SYN flood attacks in IoT systems
7 Horizon 2020, Project No. 780139
 Presentation Overview:
• IoT – new Era
• New security challenges
• Our approach
• Results - Comparison
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
IoT new era
8 Horizon 2020, Project No. 780139
 IoT: More devices connected in the Internet than people
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
IoT new era
9 Horizon 2020, Project No. 780139
IoT is the interconnection of WAN and proximity networks
Scope: Providing complex services
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
10 Horizon 2020, Project No. 780139
Nothing new comes without cost:
 Cybersecurity methodologies cannot solve the existing Security risks
 New reality: Need to reassess our notion of network security
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
11 Horizon 2020, Project No. 780139
Where the problem is located:
 Securing the Sensor and actuator networks from Denial of Service
 Security challenges in the border of WAN and Proximity networks
 IoT gateways
 Hubs
 Fog
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
12 Horizon 2020, Project No. 780139
SYN flood attack (DDoS):
The attacker initializes many TCP connections with the
target, but never establishes them
Result: The target node cannot handle new requests
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our approach
(by steps)
13 Horizon 2020, Project No. 780139
1. Set up neural networks as regressors
2. Train them with normal traffic (non malicious in the sense that there is no SYN
attack being launced)
3. The model predicts the next part of the communication Sequence
4. If predicted and upcoming sequence diverge “significantly” : node under attack
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our approach
14 Horizon 2020, Project No. 780139
Comparison of two different Neural Network architectures:
 LSTM (Recurrent)
 Gelenbe Network (feedforward)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our Approach
15 Horizon 2020, Project No. 780139
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our Approach
16 Horizon 2020, Project No. 780139
HOW TO DETECT
• Deep learning model for handling time series
• The model is being trained on time series produced by non malicious pcap
extracts ( as a regressor )
• The trained model predicts the next data point (the number of incomplete TCP
connections for the next window)
• If the actual value diverges significantly from the predicted ( predefined
Threshold ), the IP is considered to be under attack
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Results - Comparison
17 Horizon 2020, Project No. 780139
No need for much storage and computing resources
Real time response
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Results - Comparison
18 Horizon 2020, Project No. 780139
Accuracy False Positives False negatives
LSTM 62.7% 37.3% 0%
Gelenbe 80.7% 19.3% 0%
The Random Neural Network (Gelenbe-Network) seems to be more adamant
in capturing the nuances of normal traffic

Weitere ähnliche Inhalte

Was ist angesagt?

SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT project
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project SerIoT project
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Take Most Advanced "5G Training" From Tonex Training
Take Most Advanced "5G Training" From Tonex TrainingTake Most Advanced "5G Training" From Tonex Training
Take Most Advanced "5G Training" From Tonex TrainingBryan Len
 
Part 0: Course Outline - 5G for Absolute Beginners
Part 0: Course Outline - 5G for Absolute BeginnersPart 0: Course Outline - 5G for Absolute Beginners
Part 0: Course Outline - 5G for Absolute Beginners3G4G
 
Part 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute BeginnersPart 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT SecurityNUS-ISS
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
Misc: Connected and Autonomous Vehicles (CAVs)
Misc: Connected and Autonomous Vehicles (CAVs)Misc: Connected and Autonomous Vehicles (CAVs)
Misc: Connected and Autonomous Vehicles (CAVs)3G4G
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group3G4G
 
LTE-Broadcast: Reality Check
LTE-Broadcast: Reality CheckLTE-Broadcast: Reality Check
LTE-Broadcast: Reality CheckeXplanoTech
 
Cognitive Radio Standardisation In Europe Etsi
Cognitive Radio Standardisation In Europe EtsiCognitive Radio Standardisation In Europe Etsi
Cognitive Radio Standardisation In Europe Etsimelvincabatuan
 
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and AirmastsDriving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and Airmasts3G4G
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 

Was ist angesagt? (16)

SerIoT Honeypots
SerIoT HoneypotsSerIoT Honeypots
SerIoT Honeypots
 
SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigation
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Take Most Advanced "5G Training" From Tonex Training
Take Most Advanced "5G Training" From Tonex TrainingTake Most Advanced "5G Training" From Tonex Training
Take Most Advanced "5G Training" From Tonex Training
 
Part 0: Course Outline - 5G for Absolute Beginners
Part 0: Course Outline - 5G for Absolute BeginnersPart 0: Course Outline - 5G for Absolute Beginners
Part 0: Course Outline - 5G for Absolute Beginners
 
Part 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute BeginnersPart 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute Beginners
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Misc: Connected and Autonomous Vehicles (CAVs)
Misc: Connected and Autonomous Vehicles (CAVs)Misc: Connected and Autonomous Vehicles (CAVs)
Misc: Connected and Autonomous Vehicles (CAVs)
 
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research GroupSignals Flash Nov 2017: 5G in Americas | Signals Research Group
Signals Flash Nov 2017: 5G in Americas | Signals Research Group
 
LTE-Broadcast: Reality Check
LTE-Broadcast: Reality CheckLTE-Broadcast: Reality Check
LTE-Broadcast: Reality Check
 
Cognitive Radio Standardisation In Europe Etsi
Cognitive Radio Standardisation In Europe EtsiCognitive Radio Standardisation In Europe Etsi
Cognitive Radio Standardisation In Europe Etsi
 
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and AirmastsDriving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
6g intro slides_aravantinos
6g intro slides_aravantinos6g intro slides_aravantinos
6g intro slides_aravantinos
 

Ähnlich wie SerIoT Traffic Generator Module

IoTAC - An innovative approach towards security assurance of IoT architecture...
IoTAC - An innovative approach towards security assurance of IoT architecture...IoTAC - An innovative approach towards security assurance of IoT architecture...
IoTAC - An innovative approach towards security assurance of IoT architecture...ARennoch
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only PrincipleSamos2019Summit
 
Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersDimitrios Amaxilatis
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
 
Iot and big data technologies for bio industry data bio
Iot and big data technologies for bio industry   data bioIot and big data technologies for bio industry   data bio
Iot and big data technologies for bio industry data bioWirelessInfo
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)Sergio Potenciano Menci
 
RECAP at the YERUN Launch Event
RECAP at the YERUN Launch EventRECAP at the YERUN Launch Event
RECAP at the YERUN Launch EventRECAP Project
 
Opportunities of non-thermal plasma applications on wooden façades
Opportunities of non-thermal plasma applications on wooden façadesOpportunities of non-thermal plasma applications on wooden façades
Opportunities of non-thermal plasma applications on wooden façadesSebastian Dahle
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapSergio Potenciano Menci
 
Soldani_5G_Seminar_Italy15June2016_Final_Public v02
Soldani_5G_Seminar_Italy15June2016_Final_Public v02Soldani_5G_Seminar_Italy15June2016_Final_Public v02
Soldani_5G_Seminar_Italy15June2016_Final_Public v02Dr. David Soldani
 
TIMON - Enhanced real time services for an optimized multimodal mobility rely...
TIMON - Enhanced real time services for an optimized multimodal mobility rely...TIMON - Enhanced real time services for an optimized multimodal mobility rely...
TIMON - Enhanced real time services for an optimized multimodal mobility rely...European Green Vehicle Initiative
 
FASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUMFASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureBig Data Value Association
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE
 
Horizon 2020 Calls on 5G
Horizon 2020 Calls on 5GHorizon 2020 Calls on 5G
Horizon 2020 Calls on 5GKTN
 

Ähnlich wie SerIoT Traffic Generator Module (20)

IoTAC - An innovative approach towards security assurance of IoT architecture...
IoTAC - An innovative approach towards security assurance of IoT architecture...IoTAC - An innovative approach towards security assurance of IoT architecture...
IoTAC - An innovative approach towards security assurance of IoT architecture...
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only Principle
 
Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to Experimenters
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
 
Iot and big data technologies for bio industry data bio
Iot and big data technologies for bio industry   data bioIot and big data technologies for bio industry   data bio
Iot and big data technologies for bio industry data bio
 
Tnc 2009
Tnc 2009Tnc 2009
Tnc 2009
 
Pilots Overview BDVA Event
Pilots Overview BDVA EventPilots Overview BDVA Event
Pilots Overview BDVA Event
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)
 
FASTEN Objectives
FASTEN ObjectivesFASTEN Objectives
FASTEN Objectives
 
RECAP at the YERUN Launch Event
RECAP at the YERUN Launch EventRECAP at the YERUN Launch Event
RECAP at the YERUN Launch Event
 
Opportunities of non-thermal plasma applications on wooden façades
Opportunities of non-thermal plasma applications on wooden façadesOpportunities of non-thermal plasma applications on wooden façades
Opportunities of non-thermal plasma applications on wooden façades
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication Roadmap
 
Soldani_5G_Seminar_Italy15June2016_Final_Public v02
Soldani_5G_Seminar_Italy15June2016_Final_Public v02Soldani_5G_Seminar_Italy15June2016_Final_Public v02
Soldani_5G_Seminar_Italy15June2016_Final_Public v02
 
TIMON - Enhanced real time services for an optimized multimodal mobility rely...
TIMON - Enhanced real time services for an optimized multimodal mobility rely...TIMON - Enhanced real time services for an optimized multimodal mobility rely...
TIMON - Enhanced real time services for an optimized multimodal mobility rely...
 
FASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUMFASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUM
 
Infinitech Technical Overview
Infinitech Technical OverviewInfinitech Technical Overview
Infinitech Technical Overview
 
2019 04-08 hopu-aj
2019 04-08 hopu-aj2019 04-08 hopu-aj
2019 04-08 hopu-aj
 
Fintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's futureFintech and Insurance case studies digitally transforming Europe's future
Fintech and Insurance case studies digitally transforming Europe's future
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
 
Horizon 2020 Calls on 5G
Horizon 2020 Calls on 5GHorizon 2020 Calls on 5G
Horizon 2020 Calls on 5G
 

Kürzlich hochgeladen

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Kürzlich hochgeladen (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

SerIoT Traffic Generator Module

  • 1. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Secure and Safe Internet ofThings (SerIoT) 1 Horizon 2020, Project No. 780139 Traffic Generator and Detector of malicious traffic S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos (ICCS) and E. Gelenbe (IITIS)
  • 2. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Relevant References 2 Horizon 2020, Project No. 780139  S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos and E. Gelenbe, “Neural network architectures for the detection of SYN flood attacks,” in IoT systems, PETRA 2020: The 13th International Conference on PErvasive Technologies Related to Assistive Technologies, pp. 69:1- 69:4 (2020), ACM https://dl.acm.org/doi/10.1145/3389189.3398000  Prior Related Work:  O. Brun, Y. Yin and E. Gelenbe, “ Deep Learning with dense random neural network for detecting attacks against IoT-connected home environments, “ Procedia Computer Science 134: 458-463 (2018)
  • 3. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Attack Traffic Generator 3 Horizon 2020, Project No. 780139 Use of VirtualBox: Creation of a number of VMs (18.04 compatibility) NAT network configuration enables the created VMs to connect to the Internet VM-1 : Client IP->192.168.56.100 script b9generator.py VM-2 : Server IP->192.168.56.101 script server.py
  • 4. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Attack Traffic Generator 4 Horizon 2020, Project No. 780139 FIRST COMMUNICATION CAPTURED Two scripts running on each VM (server.py on server VM, b9generator.py on client VM) 400 Full TCP connections established Communication captured using Wireshark -> b9traffic.pcap
  • 5. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Attack Traffic Generator 5 Horizon 2020, Project No. 780139 All the traffic generated by the bot network: captured by Wireshark Realtimesenario.pcap *observation: The server was running short on its resources and its capability to handle requests was massively inhibited Realtimesenario.pcap :annotated as such -> 5sec windows and every window is assigned to a metric (half opened TCP connections)
  • 6. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Attack Traffic Generator 6 Horizon 2020, Project No. 780139  After a while the attack is in full effect. Therefore the ability of the server to handle requests is massively inhibited. So, Wireshark shows a number of retransmissions.
  • 7. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Neural Network Architectures for the Detection of SYN flood attacks in IoT systems 7 Horizon 2020, Project No. 780139  Presentation Overview: • IoT – new Era • New security challenges • Our approach • Results - Comparison
  • 8. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 IoT new era 8 Horizon 2020, Project No. 780139  IoT: More devices connected in the Internet than people
  • 9. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 IoT new era 9 Horizon 2020, Project No. 780139 IoT is the interconnection of WAN and proximity networks Scope: Providing complex services
  • 10. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 New security challenges 10 Horizon 2020, Project No. 780139 Nothing new comes without cost:  Cybersecurity methodologies cannot solve the existing Security risks  New reality: Need to reassess our notion of network security
  • 11. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 New security challenges 11 Horizon 2020, Project No. 780139 Where the problem is located:  Securing the Sensor and actuator networks from Denial of Service  Security challenges in the border of WAN and Proximity networks  IoT gateways  Hubs  Fog
  • 12. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 New security challenges 12 Horizon 2020, Project No. 780139 SYN flood attack (DDoS): The attacker initializes many TCP connections with the target, but never establishes them Result: The target node cannot handle new requests
  • 13. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Our approach (by steps) 13 Horizon 2020, Project No. 780139 1. Set up neural networks as regressors 2. Train them with normal traffic (non malicious in the sense that there is no SYN attack being launced) 3. The model predicts the next part of the communication Sequence 4. If predicted and upcoming sequence diverge “significantly” : node under attack
  • 14. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Our approach 14 Horizon 2020, Project No. 780139 Comparison of two different Neural Network architectures:  LSTM (Recurrent)  Gelenbe Network (feedforward)
  • 15. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Our Approach 15 Horizon 2020, Project No. 780139
  • 16. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Our Approach 16 Horizon 2020, Project No. 780139 HOW TO DETECT • Deep learning model for handling time series • The model is being trained on time series produced by non malicious pcap extracts ( as a regressor ) • The trained model predicts the next data point (the number of incomplete TCP connections for the next window) • If the actual value diverges significantly from the predicted ( predefined Threshold ), the IP is considered to be under attack
  • 17. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Results - Comparison 17 Horizon 2020, Project No. 780139 No need for much storage and computing resources Real time response
  • 18. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Results - Comparison 18 Horizon 2020, Project No. 780139 Accuracy False Positives False negatives LSTM 62.7% 37.3% 0% Gelenbe 80.7% 19.3% 0% The Random Neural Network (Gelenbe-Network) seems to be more adamant in capturing the nuances of normal traffic