3.8 Proceedings Paper

Fast, Lightweight IoT Anomaly Detection Using Feature Pruning and PCA

Journal

37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING
Volume -, Issue -, Pages 133-138

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3477314.3508377

Keywords

Principal Component Analysis; Support Vector Machines; Neural Networks; Internet of Things; Malware detection; Anomaly Detection

Funding

  1. Auerbach Berger Chair of Cyber-security

Ask authors/readers for more resources

Anomaly detection is a method for identifying malware and other anomalies, which can be applied to computing hosts and IoT devices. Using PCA for feature engineering in anomaly detection improves the performance and efficacy of detection models, particularly for resource-constrained IoT devices.
Anomaly detection is a method for identifying malware and other anomalies such as memory leaks on computing hosts and, more recently, Internet of Things (IoT) devices. Due to its lightweight resource use and efficacy, anomaly detection is a promising method to detect malware on small, resource-constrained hosts. Using Principal Component Analysis (PCA) to reduce the features, and hence the dimensionality of the anomaly detector, is common during the feature engineering process of classic machine learning methods, such as Support Vector Machines (SVM). However, as Neural Networks (NN) became more popular, many presumed that using PCA prior to using the data to train and deploy the model was unnecessary. In this work, we show that there is a significant advantage to using PCA for both SVM and NN-based anomaly detection. Doing so improves the performance and efficacy of malware detection models, and reduces the amount of data that needs to be stored on the device for on-device anomaly detection, thus making it useful for resource-constrained IoT devices. We also show that while pruning low-variance features may be an intuitive way to simplify a model, it is less effective than PCA to improve model training and deployment performance as well as model efficacy to detect malware.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available