There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being typically placed in uncontrolled environments make traditional IT security mechanisms such as signature-based intrusion detection and prevention systems challenging to integrate. They also struggle to cope with the rapidly evolving IoT threat landscape due to long delays between the analysis and publication of the detection rules. Machine learning methods have shown faster response to emerging threats; however, model training architectures like cloud or edge computing face multiple drawbacks in IoT settings, including network overhead and data isolation arising from the large scale and heterogeneity that characterizes these networks. This work presents an architecture for training unsupervised models for network intrusion detection in large, distributed IoT and Industrial IoT (IIoT) deployments. We leverage Federated Learning (FL) to collaboratively train between peers and reduce isolation and network overhead problems. We build upon it to include an unsupervised device clustering algorithm fully integrated into the FL pipeline to address the heterogeneity issues that arise in FL settings. The architecture is implemented and evaluated using a testbed that includes various emulated IoT/IIoT devices and attackers interacting in a complex network topology comprising 100 emulated devices, 30 switches and 10 routers. The anomaly detection models are evaluated on real attacks performed by the testbed's threat actors, including the entire Mirai malware lifecycle, an additional botnet based on the Merlin command and control server and other red-teaming tools performing scanning activities and multiple attacks targeting the emulated devices.
翻译:面向大规模异构物联网网络异常检测的聚类联邦学习体系结构
网络物联设备的网络攻击日益增多,攻击的复杂性和动机也在增加。由于物联网的规模庞大、硬件和软件多样化,并且通常放置在不受控制的环境中,传统的IT安全机制,如基于签名的入侵检测和预防系统,难以整合。他们也难以应对物联网威胁景观的快速演变,因为分析和检测规则发布之间存在较长时间间隔。机器学习方法已经展示了更快的反应速度来应对新出现的威胁。但是,像云或边缘计算这样的模型训练架构在物联网环境中面临着许多缺点,包括由于这些网络的大规模性和异构性而产生的网络开销和数据隔离。本文提出了一种针对大型分布式物联网和工业物联网(IIoT)部署的无监督网络入侵检测模型训练体系结构。我们利用联邦学习(FL)在对等方之间协作训练,并减少了隔离和网络开销问题。我们基于此构建一个完全集成到FL管道中的无监督设备聚类算法来解决FL设置中出现的异构性问题。该体系结构采用一个测试平台进行实现和评估,包括各种模拟的物联网/工业物联网设备和攻击者在复杂的网络拓扑中相互作用,包括100个模拟设备、30个交换机和10个路由器。入侵检测模型在测试平台的威胁行为(包括整个Mirai恶意软件生命周期、基于Merlin命令和控制服务器的其他僵尸网络以及执行扫描活动和多个针对模拟设备的攻击)中进行评估。