Machine learning architectures for early detection and classification of botnet attack in the internet of things

Detalhes bibliográficos
Ano de defesa: 2023
Autor(a) principal: Andressa Amaral Cunha
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: eng
Instituição de defesa: Universidade Federal de Minas Gerais
Brasil
ICX - DEPARTAMENTO DE CIÊNCIA DA COMPUTAÇÃO
Programa de Pós-Graduação em Ciência da Computação
UFMG
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: http://hdl.handle.net/1843/61119
Resumo: Internet of Things (IoT) is an area that deals with pervasive systems, connected by communication standards such as Bluetooth, WiFi and 5G. To provide low-latency services, edge computing emerges as a paradigm that allows processing data closer to the sensing layer, where information is acquired from environment. Recent IoT applications require real-time solutions, with the security of data and devices guaranteed, focusing on correct data management and the development of energy efficient systems. Applying machine learning techniques to IoT devices is a possible solution that can help with requirements such as data governance (security, reliability and usability), balancing processing and decision making, such as early detection of attacks coming from the network, recognition of objects, or self-improvement of IoT systems. To assist with these requirements, edge computing has also been widely used for the purpose of creating real-time and energy-efficient systems. The goal of this work is to evaluate the use of machine learning in IoT and edge computing environments, focusing on the analysis of the security requirement of applications and devices. For this, two empirical experiments are proposed regarding the security requirement, conducting a study on botnet attacks on IoT devices and possible strategies to protect them against these types of threats.