SlideShare a Scribd company logo
1 of 12
Deep Learning Analytics
for IoT Security over a
Configurable Big Data
Platform
Speaker: Angela-Maria Despotopoulou
Research Scientist
Athens Information Technology, Greece
Paper Authors
30/11/2019 2
Stefanos Astaras
sast@ait.gr
Sofoklis Efremidis
sefr@ait.gr
Angela-Maria
Despotopoulou
ades@ait.gr
Nikos Kefalakis
Nikos.KEFALAKIS@intrasoft
-intl.com
John Soldatos
jsol@ait.gr
Presentation Take-Aways
Presentation
Contents
an architectural
framework that
provides a data driven
security monitoring
mechanism for all
layers of an IoT system
deep learning
algorithms tested over a
practical implementation
of the framework, called
Variational
Autoencoders
30/11/2019 3
Contemporary IoT security challenges
Vulnerabilities of smart objects (e.g. hacking of software).
Threats associated with the convergence of Information and
Operational technologies.
Increased legal requirements in complying with Regulations.
New sophisticated ways for conducting large-scale attacks.
Increased
sophistication
of IoT Systems
also means…
A
B
C
D
30/11/2019 4
30/11/2019 5
Deep Learning
30/11/2019 6
Analytics Engine Algorithm
Trains itself using sequences of historical data.
Isolates and stores patterns of suspicious behavior.
Implemented Example:
Variational Autoencoder (VAE)
… when evaluation
suggests an attack is
taking place.
Alerts
… them, with patterns
encountered during
training
Juxtaposes
… new, previously
unknown streams of
measurements from IoT
devices
Monitors
Autoencoders
Conceptually separated into the
encoder and the decoder
(similarly to image
compression).
Part of the information is lost
during the encoding process
and cannot be recovered when
decoding.
Find the pair that keeps the
maximum of information when
encoding and, so, has the
minimum of reconstruction error
when decoding.
Variational Autoencoder (VAE)
an autoencoder whose training
is regularized to avoid
overfitting to the training
dataset, while performing
poorly in new unknown
datasets.
Structure Anomalies Indicator Purpose A Step Further
30/11/2019 7
Benefits of VAE
30/11/2019 8
The Model can be fitted to new abnormal
cases without retraining the whole dataset.
The Model can reconstruct missing
features in the input data.
The Model can detect abnormalities that
had not been encountered during training.
The Model is efficient on data of low
dimensionality and isolated attacks.
To validate the performance of
the approach and its integration
in the platform, we have trained
autoencoders of various
complexities with various
datasets. Here follow two use
cases, one for connected car
datasets and one for socially
assistive robots.
02
03
04
01
Connected Cars Use Case
The car behavior is represented as a set of data sequences, for example measurements from sensors
installed on the Vehicle that count its speed, fuel or steering angle.
The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set.
30/11/2019 9
Socially Assistive Robots Case
The dataset contained sensor and context reports from a Robot: motor readings, gesture reports,
event timestamps.
In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%.
30/11/2019 10
Acknowledgements
30/11/2019 11
This work has been carried out in the scope of the H2020 SecureIoT project, which
is funded by the European Commission in the scope of its Horizon 2020 research
and innovation programme (contract number 779899). The authors acknowledge
valuable help and contributions from all partners of the project.
THANK YOU
Angela-Maria Despotopoulou
Athens Information Technology, Greece

More Related Content

What's hot

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehiclessulaiman_karim
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...IJITCA Journal
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Zac Darcy
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)Zac Darcy
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)acijjournal
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...IJCSES Journal
 
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...IJITCA Journal
 

What's hot (19)

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
CAIJ
CAIJCAIJ
CAIJ
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Ijaca
IjacaIjaca
Ijaca
 
IoT won't work without AI
IoT won't work without AIIoT won't work without AI
IoT won't work without AI
 
Ijamc
IjamcIjamc
Ijamc
 
Ijaca
IjacaIjaca
Ijaca
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
 
Ijaca
IjacaIjaca
Ijaca
 
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...
 
Ijaca
IjacaIjaca
Ijaca
 
Ijaca
IjacaIjaca
Ijaca
 

Similar to Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningVenkat Projects
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidentsijtsrd
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020shoaibulhassanuos
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptxMacZain
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...Rick Bouter
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Capgemini
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine LearningIRJET Journal
 

Similar to Deep Learning Analytics for IoT Security over a Configurable Big Data Platform (20)

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptx
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine Learning
 

Recently uploaded

The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Calllward7
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Valters Lauzums
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonPayment Village
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理cyebo
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxDilipVasan
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp onlinebalibahu1313
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...ssuserf63bd7
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理pyhepag
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdfvyankatesh1
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyRafigAliyev2
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理cyebo
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理pyhepag
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Jon Hansen
 

Recently uploaded (20)

The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)
 

Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

  • 1. Deep Learning Analytics for IoT Security over a Configurable Big Data Platform Speaker: Angela-Maria Despotopoulou Research Scientist Athens Information Technology, Greece
  • 2. Paper Authors 30/11/2019 2 Stefanos Astaras sast@ait.gr Sofoklis Efremidis sefr@ait.gr Angela-Maria Despotopoulou ades@ait.gr Nikos Kefalakis Nikos.KEFALAKIS@intrasoft -intl.com John Soldatos jsol@ait.gr
  • 3. Presentation Take-Aways Presentation Contents an architectural framework that provides a data driven security monitoring mechanism for all layers of an IoT system deep learning algorithms tested over a practical implementation of the framework, called Variational Autoencoders 30/11/2019 3
  • 4. Contemporary IoT security challenges Vulnerabilities of smart objects (e.g. hacking of software). Threats associated with the convergence of Information and Operational technologies. Increased legal requirements in complying with Regulations. New sophisticated ways for conducting large-scale attacks. Increased sophistication of IoT Systems also means… A B C D 30/11/2019 4
  • 6. Deep Learning 30/11/2019 6 Analytics Engine Algorithm Trains itself using sequences of historical data. Isolates and stores patterns of suspicious behavior. Implemented Example: Variational Autoencoder (VAE) … when evaluation suggests an attack is taking place. Alerts … them, with patterns encountered during training Juxtaposes … new, previously unknown streams of measurements from IoT devices Monitors
  • 7. Autoencoders Conceptually separated into the encoder and the decoder (similarly to image compression). Part of the information is lost during the encoding process and cannot be recovered when decoding. Find the pair that keeps the maximum of information when encoding and, so, has the minimum of reconstruction error when decoding. Variational Autoencoder (VAE) an autoencoder whose training is regularized to avoid overfitting to the training dataset, while performing poorly in new unknown datasets. Structure Anomalies Indicator Purpose A Step Further 30/11/2019 7
  • 8. Benefits of VAE 30/11/2019 8 The Model can be fitted to new abnormal cases without retraining the whole dataset. The Model can reconstruct missing features in the input data. The Model can detect abnormalities that had not been encountered during training. The Model is efficient on data of low dimensionality and isolated attacks. To validate the performance of the approach and its integration in the platform, we have trained autoencoders of various complexities with various datasets. Here follow two use cases, one for connected car datasets and one for socially assistive robots. 02 03 04 01
  • 9. Connected Cars Use Case The car behavior is represented as a set of data sequences, for example measurements from sensors installed on the Vehicle that count its speed, fuel or steering angle. The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set. 30/11/2019 9
  • 10. Socially Assistive Robots Case The dataset contained sensor and context reports from a Robot: motor readings, gesture reports, event timestamps. In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%. 30/11/2019 10
  • 11. Acknowledgements 30/11/2019 11 This work has been carried out in the scope of the H2020 SecureIoT project, which is funded by the European Commission in the scope of its Horizon 2020 research and innovation programme (contract number 779899). The authors acknowledge valuable help and contributions from all partners of the project.
  • 12. THANK YOU Angela-Maria Despotopoulou Athens Information Technology, Greece