SlideShare a Scribd company logo
Deep Learning Analytics
for IoT Security over a
Configurable Big Data
Platform
Speaker: Angela-Maria Despotopoulou
Research Scientist
Athens Information Technology, Greece
Paper Authors
30/11/2019 2
Stefanos Astaras
sast@ait.gr
Sofoklis Efremidis
sefr@ait.gr
Angela-Maria
Despotopoulou
ades@ait.gr
Nikos Kefalakis
Nikos.KEFALAKIS@intrasoft
-intl.com
John Soldatos
jsol@ait.gr
Presentation Take-Aways
Presentation
Contents
an architectural
framework that
provides a data driven
security monitoring
mechanism for all
layers of an IoT system
deep learning
algorithms tested over a
practical implementation
of the framework, called
Variational
Autoencoders
30/11/2019 3
Contemporary IoT security challenges
Vulnerabilities of smart objects (e.g. hacking of software).
Threats associated with the convergence of Information and
Operational technologies.
Increased legal requirements in complying with Regulations.
New sophisticated ways for conducting large-scale attacks.
Increased
sophistication
of IoT Systems
also means…
A
B
C
D
30/11/2019 4
30/11/2019 5
Deep Learning
30/11/2019 6
Analytics Engine Algorithm
Trains itself using sequences of historical data.
Isolates and stores patterns of suspicious behavior.
Implemented Example:
Variational Autoencoder (VAE)
… when evaluation
suggests an attack is
taking place.
Alerts
… them, with patterns
encountered during
training
Juxtaposes
… new, previously
unknown streams of
measurements from IoT
devices
Monitors
Autoencoders
Conceptually separated into the
encoder and the decoder
(similarly to image
compression).
Part of the information is lost
during the encoding process
and cannot be recovered when
decoding.
Find the pair that keeps the
maximum of information when
encoding and, so, has the
minimum of reconstruction error
when decoding.
Variational Autoencoder (VAE)
an autoencoder whose training
is regularized to avoid
overfitting to the training
dataset, while performing
poorly in new unknown
datasets.
Structure Anomalies Indicator Purpose A Step Further
30/11/2019 7
Benefits of VAE
30/11/2019 8
The Model can be fitted to new abnormal
cases without retraining the whole dataset.
The Model can reconstruct missing
features in the input data.
The Model can detect abnormalities that
had not been encountered during training.
The Model is efficient on data of low
dimensionality and isolated attacks.
To validate the performance of
the approach and its integration
in the platform, we have trained
autoencoders of various
complexities with various
datasets. Here follow two use
cases, one for connected car
datasets and one for socially
assistive robots.
02
03
04
01
Connected Cars Use Case
The car behavior is represented as a set of data sequences, for example measurements from sensors
installed on the Vehicle that count its speed, fuel or steering angle.
The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set.
30/11/2019 9
Socially Assistive Robots Case
The dataset contained sensor and context reports from a Robot: motor readings, gesture reports,
event timestamps.
In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%.
30/11/2019 10
Acknowledgements
30/11/2019 11
This work has been carried out in the scope of the H2020 SecureIoT project, which
is funded by the European Commission in the scope of its Horizon 2020 research
and innovation programme (contract number 779899). The authors acknowledge
valuable help and contributions from all partners of the project.
THANK YOU
Angela-Maria Despotopoulou
Athens Information Technology, Greece

More Related Content

What's hot

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
sulaiman_karim
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
Zac Darcy
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...
IJITCA Journal
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
Zac Darcy
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...
Zac Darcy
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
Zac Darcy
 
CAIJ
CAIJCAIJ
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
Privacy Data Protection for Engineering
 
Ijaca
IjacaIjaca
IoT won't work without AI
IoT won't work without AIIoT won't work without AI
IoT won't work without AI
Vincent Verstraete
 
Ijamc
IjamcIjamc
Ijaca
IjacaIjaca
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)
acijjournal
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
IJCSES Journal
 
Ijaca
IjacaIjaca
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...
IJITCA Journal
 
Ijaca
IjacaIjaca
Ijaca
IjacaIjaca

What's hot (19)

Data Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous VehiclesData Privacy and Security in Autonomous Vehicles
Data Privacy and Security in Autonomous Vehicles
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...Call for papers - 9 th International Conference on Instrumentation and Contro...
Call for papers - 9 th International Conference on Instrumentation and Contro...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...Call For Papers - International Journal of Information Technology, Modeling a...
Call For Papers - International Journal of Information Technology, Modeling a...
 
International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)International Journal of Information Technology, Modeling and Computing (IJITMC)
International Journal of Information Technology, Modeling and Computing (IJITMC)
 
CAIJ
CAIJCAIJ
CAIJ
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Ijaca
IjacaIjaca
Ijaca
 
IoT won't work without AI
IoT won't work without AIIoT won't work without AI
IoT won't work without AI
 
Ijamc
IjamcIjamc
Ijamc
 
Ijaca
IjacaIjaca
Ijaca
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)
 
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
CALL FOR PAPERS - 8 th International Conference on Cybernetics & Informatics ...
 
Ijaca
IjacaIjaca
Ijaca
 
10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...10th International Conference on Control, Modelling, Computing and Applicatio...
10th International Conference on Control, Modelling, Computing and Applicatio...
 
Ijaca
IjacaIjaca
Ijaca
 
Ijaca
IjacaIjaca
Ijaca
 

Similar to Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
Venkat Projects
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET Journal
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
ijtsrd
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
shoaibulhassanuos
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET Journal
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
IJECEIAES
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptx
MacZain
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET Journal
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
Hamzamohammed70
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
IRJET Journal
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
Rick Bouter
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Capgemini
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine Learning
IRJET Journal
 

Similar to Deep Learning Analytics for IoT Security over a Configurable Big Data Platform (20)

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 
digital twin seminar 1.pptx
digital twin seminar 1.pptxdigital twin seminar 1.pptx
digital twin seminar 1.pptx
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
 
Smart Traffic System using Machine Learning
Smart Traffic System using Machine LearningSmart Traffic System using Machine Learning
Smart Traffic System using Machine Learning
 

Recently uploaded

STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Fernanda Palhano
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 

Recently uploaded (20)

STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 

Deep Learning Analytics for IoT Security over a Configurable Big Data Platform

  • 1. Deep Learning Analytics for IoT Security over a Configurable Big Data Platform Speaker: Angela-Maria Despotopoulou Research Scientist Athens Information Technology, Greece
  • 2. Paper Authors 30/11/2019 2 Stefanos Astaras sast@ait.gr Sofoklis Efremidis sefr@ait.gr Angela-Maria Despotopoulou ades@ait.gr Nikos Kefalakis Nikos.KEFALAKIS@intrasoft -intl.com John Soldatos jsol@ait.gr
  • 3. Presentation Take-Aways Presentation Contents an architectural framework that provides a data driven security monitoring mechanism for all layers of an IoT system deep learning algorithms tested over a practical implementation of the framework, called Variational Autoencoders 30/11/2019 3
  • 4. Contemporary IoT security challenges Vulnerabilities of smart objects (e.g. hacking of software). Threats associated with the convergence of Information and Operational technologies. Increased legal requirements in complying with Regulations. New sophisticated ways for conducting large-scale attacks. Increased sophistication of IoT Systems also means… A B C D 30/11/2019 4
  • 6. Deep Learning 30/11/2019 6 Analytics Engine Algorithm Trains itself using sequences of historical data. Isolates and stores patterns of suspicious behavior. Implemented Example: Variational Autoencoder (VAE) … when evaluation suggests an attack is taking place. Alerts … them, with patterns encountered during training Juxtaposes … new, previously unknown streams of measurements from IoT devices Monitors
  • 7. Autoencoders Conceptually separated into the encoder and the decoder (similarly to image compression). Part of the information is lost during the encoding process and cannot be recovered when decoding. Find the pair that keeps the maximum of information when encoding and, so, has the minimum of reconstruction error when decoding. Variational Autoencoder (VAE) an autoencoder whose training is regularized to avoid overfitting to the training dataset, while performing poorly in new unknown datasets. Structure Anomalies Indicator Purpose A Step Further 30/11/2019 7
  • 8. Benefits of VAE 30/11/2019 8 The Model can be fitted to new abnormal cases without retraining the whole dataset. The Model can reconstruct missing features in the input data. The Model can detect abnormalities that had not been encountered during training. The Model is efficient on data of low dimensionality and isolated attacks. To validate the performance of the approach and its integration in the platform, we have trained autoencoders of various complexities with various datasets. Here follow two use cases, one for connected car datasets and one for socially assistive robots. 02 03 04 01
  • 9. Connected Cars Use Case The car behavior is represented as a set of data sequences, for example measurements from sensors installed on the Vehicle that count its speed, fuel or steering angle. The optimal error threshold for this model is t=0.22, where the accuracy score is 89% on this test set. 30/11/2019 9
  • 10. Socially Assistive Robots Case The dataset contained sensor and context reports from a Robot: motor readings, gesture reports, event timestamps. In this case, the ideal error threshold is t=0.02, where the accuracy score is 73%. 30/11/2019 10
  • 11. Acknowledgements 30/11/2019 11 This work has been carried out in the scope of the H2020 SecureIoT project, which is funded by the European Commission in the scope of its Horizon 2020 research and innovation programme (contract number 779899). The authors acknowledge valuable help and contributions from all partners of the project.
  • 12. THANK YOU Angela-Maria Despotopoulou Athens Information Technology, Greece