SlideShare a Scribd company logo
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Secure and Safe Internet ofThings (SerIoT)
1 Horizon 2020, Project No. 780139
29.01.2021
Multi-agent Anomaly Detection module
Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Multi-agent anomaly detection
module(1/2)
2 Horizon 2020, Project No. 780139
The multi-agent Anomaly detection module is designed in order to:
 Secure a wide and complex IoT network infrastructure from adversarial actions
ensuring smooth and resilient service provision.
 Address the distributed nature of cyber attacks by engaging a lower resource
consuming distributed detection technique.
 Mitigate the case of an attack spreading to adjacent devices, providing early
indentification of the compromised network device.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Multi-agent anomaly detection
module(2/2)
3 Horizon 2020, Project No. 780139
Why choosing the distributed detection scheme?
 To address the resource constraints in terms of bandwidth and power
consumption posed by the utilization of heterogeneous IoT devices
 To better accommodate the complexity of an IoT network infrastructure by
exploiting the merit of structural features exchange among neighboring nodes and
their attached edges, in a localized monitoring scheme.
 To present a distributed detection scheme against the distributed nature of several
DoS attacks with high detection efficiency.
 To identify infectious distributed attacks within the IoT network such as malware
causing root-to-branch attacks, in a synergistic manner inheriting the advantages
of a multi-agent system.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
KPIs used for the anomaly detection
method evaluation
4 Horizon 2020, Project No. 780139
 Accuracy of Detection measures the
successful results over the total
number of detections.
 F1 score describes how precise the
detection method has been in
identifying normal and abnormal
cases out of the actual positive and
negative instances respectively.
 Detection Delay counts the time
between the burst of the attack and
its detection.
 Time of proactive detection indicates the
time of early detection, before the attack
spreads in the network.
 Bandwidth overhead describes the
network load added by operating the
detection method.
 Power Consumption overhead measures
the added Power Consumption which the
detection method has caused to the
network.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
High level overview of module
operation
Horizon 2020, Project No. 780139
4
1. The IoT network is reflected on a Graph
structure where Nodes depict a set of network
devices and Edges depict their interconnection
links.
2. Intelligent Agents are positioned upon a set of
Nodes (sensors, actuators, forwarders or
servers) to monitor local devices and their
connections.
3. Agents exchange traffic statistics information
among their neighbors by engaging a Graph
Neural Network algorithm.
4. Each Node is able to predict an anomaly score
regarding itself and its adjacent neighbors’
status.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Graph Neural Networks methodology for
anomaly detection
Horizon 2020, Project No. 780139
4
 A set of features (traffic data) is associated to each Node and Edge of the network.
 Each agent deploying a Graph Neural Network algorithm with Edge and Node Deep Neural
Networks (DNN) processes the feature vectors.
• Edge DNN updates the features of neighboring nodes.
• Node DNN uses the updated edge feature values to update the feature values of the specific node.
 Two classifiers are responsible to predict anomalies in the neighborhood, and the specific
Node.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Experimental results
7 Horizon 2020, Project No. 780139
 The Proposed method was compared with SoA methods and Machine Learning
techniques against several network traffic datasets to evaluate its performance.
• Botnet CTU13
• IEEE Dataport IoT network intrusion attack dataset (TCP/SYN, UDP Flood, Port Scanning)
• Infiltration attack simulated scenario
• Worm attack propagation simulated scenario
 Extensive experiments showcase the outperformance of the GNN detection method
compared to similar mechanisms in terms of detection efficiency.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Experimental Resutls
Portscan attack
Detection method devices ROC score Accuracy
GNN 99.00 99.00
SVM 91.36 91.36
Decision Tree 92.86 92.86
Random Forest 92.86 92.86
Infiltration attack
Detection method devices ROC score Accuracy
GNN 99.00 99.00
SVM 91.36 91.36
Decision Tree 92.86 92.86
Random Forest 92.86 92.86
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Anomaly Detection interaction with
Visual Analytics Dashboard
9 Horizon 2020, Project No. 780139
Anomaly detection
recognizes five
abnormal devices
Active events are
populated with
abnormality details
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
10 Horizon 2020, Project No. 780139
SerIoT project (2020), Deliverable ‘D4.6-Cross-layer anomaly detection framework’
- A. Protogerou, S. Papadopoulos, A. Drosou, D. Tzovaras, I. Refanidis, "A Graph Neural Network method
for distributed Anomaly Detection in IoT", Evolving Systems (2020).
- Yavuz, F.Y., ̈Unal, D., G ̈ul, E.: Deep learning for detection of routing attacks in theinternet of things.
International Journal of Computational Intelligence Systems12(1),39–58 (2018)
- Y. Meidan et al., "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders,"
in IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, Jul.-Sep. (2018).
Related Publications

More Related Content

PPTX
SerIoT: Penetration testing
PPTX
SerIoT: Formal Verification
PDF
Cognitive Packet Network with Software Defined Networks using the Random Neur...
PPTX
SerIoT Traffic Generator and Detector of malicious traffic patterns
PPTX
SerIoT Honeypots
PDF
Main Innovations of the SerIoT project
PDF
Autopolicy module
PDF
SerIot Hypothesis Testing Module
SerIoT: Penetration testing
SerIoT: Formal Verification
Cognitive Packet Network with Software Defined Networks using the Random Neur...
SerIoT Traffic Generator and Detector of malicious traffic patterns
SerIoT Honeypots
Main Innovations of the SerIoT project
Autopolicy module
SerIot Hypothesis Testing Module

What's hot (18)

PDF
SerIoT Unsupervised IoT-ready Engine for threat mitigation
PDF
SerIoT Fog Substrate and SDN Security
PDF
SerIoT Traffic Generator Module
PDF
Cybersecurity and continuous intelligence
PDF
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
PPTX
Medina general presentation
PPTX
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
PDF
First Impressions on Experimenting with Automated Monitoring Requirements of ...
PDF
Alcatel Wimax Whitepaper (quantumwimax.com)
PDF
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
PPT
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
PPTX
ITU Cybersecurity Capabilities
 
PPTX
5G mission diary: Houston, we have a problem
PDF
Ericsson Mobility Report June 2019
PDF
Part 0: Course Outline - 5G for Absolute Beginners
PDF
InteGrid SRA & Replication Roadmap (02/06/2020)
PPTX
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
PDF
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Fog Substrate and SDN Security
SerIoT Traffic Generator Module
Cybersecurity and continuous intelligence
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Medina general presentation
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
Alcatel Wimax Whitepaper (quantumwimax.com)
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU Cybersecurity Capabilities
 
5G mission diary: Houston, we have a problem
Ericsson Mobility Report June 2019
Part 0: Course Outline - 5G for Absolute Beginners
InteGrid SRA & Replication Roadmap (02/06/2020)
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Ad

Similar to Multi Agent Anomaly detection Module (20)

PDF
Anomaly Detection in Smart Home IoT Systems Using Machine Learning Approaches
PDF
A novel deep anomaly detection approach for intrusion detection in futuristic...
PDF
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
PDF
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
PDF
An unsupervised generative adversarial network based-host intrusion detection...
PDF
Machine learning-based anomaly detection for smart home networks under advers...
PPTX
Anomaly Detection in Network Traffic using Machine Learning.pptx
PDF
ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS M.Sc. Thesis
PDF
Anomaly based intrusion detection using ensemble machine learning and block-c...
PDF
POSTER_Ewonye.pdf
PDF
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
PDF
Automated diagnosis of attacks in internet of things using machine learning a...
PDF
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
PDF
Deep learning algorithms for intrusion detection systems in internet of thin...
PDF
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
PPTX
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
PDF
Dynamic aodv
PDF
journal for research
PDF
A review on machine learning based intrusion detection system for internet of...
PPTX
ENHANCED FEATURES SELECTION AND CLUSTER-BASE CLASSIFICATION FOR DETECTING ZER...
Anomaly Detection in Smart Home IoT Systems Using Machine Learning Approaches
A novel deep anomaly detection approach for intrusion detection in futuristic...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
An unsupervised generative adversarial network based-host intrusion detection...
Machine learning-based anomaly detection for smart home networks under advers...
Anomaly Detection in Network Traffic using Machine Learning.pptx
ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS M.Sc. Thesis
Anomaly based intrusion detection using ensemble machine learning and block-c...
POSTER_Ewonye.pdf
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Automated diagnosis of attacks in internet of things using machine learning a...
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
Deep learning algorithms for intrusion detection systems in internet of thin...
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
Dynamic aodv
journal for research
A review on machine learning based intrusion detection system for internet of...
ENHANCED FEATURES SELECTION AND CLUSTER-BASE CLASSIFICATION FOR DETECTING ZER...
Ad

Recently uploaded (20)

PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Digital Strategies for Manufacturing Companies
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Introduction to Artificial Intelligence
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
PPTX
history of c programming in notes for students .pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPT
Introduction Database Management System for Course Database
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Computer Software and OS of computer science of grade 11.pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Digital Strategies for Manufacturing Companies
Reimagine Home Health with the Power of Agentic AI​
Introduction to Artificial Intelligence
Understanding Forklifts - TECH EHS Solution
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY
history of c programming in notes for students .pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Introduction Database Management System for Course Database
Designing Intelligence for the Shop Floor.pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
Operating system designcfffgfgggggggvggggggggg
VVF-Customer-Presentation2025-Ver1.9.pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...

Multi Agent Anomaly detection Module

  • 1. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Secure and Safe Internet ofThings (SerIoT) 1 Horizon 2020, Project No. 780139 29.01.2021 Multi-agent Anomaly Detection module Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
  • 2. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Multi-agent anomaly detection module(1/2) 2 Horizon 2020, Project No. 780139 The multi-agent Anomaly detection module is designed in order to:  Secure a wide and complex IoT network infrastructure from adversarial actions ensuring smooth and resilient service provision.  Address the distributed nature of cyber attacks by engaging a lower resource consuming distributed detection technique.  Mitigate the case of an attack spreading to adjacent devices, providing early indentification of the compromised network device.
  • 3. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Multi-agent anomaly detection module(2/2) 3 Horizon 2020, Project No. 780139 Why choosing the distributed detection scheme?  To address the resource constraints in terms of bandwidth and power consumption posed by the utilization of heterogeneous IoT devices  To better accommodate the complexity of an IoT network infrastructure by exploiting the merit of structural features exchange among neighboring nodes and their attached edges, in a localized monitoring scheme.  To present a distributed detection scheme against the distributed nature of several DoS attacks with high detection efficiency.  To identify infectious distributed attacks within the IoT network such as malware causing root-to-branch attacks, in a synergistic manner inheriting the advantages of a multi-agent system.
  • 4. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 KPIs used for the anomaly detection method evaluation 4 Horizon 2020, Project No. 780139  Accuracy of Detection measures the successful results over the total number of detections.  F1 score describes how precise the detection method has been in identifying normal and abnormal cases out of the actual positive and negative instances respectively.  Detection Delay counts the time between the burst of the attack and its detection.  Time of proactive detection indicates the time of early detection, before the attack spreads in the network.  Bandwidth overhead describes the network load added by operating the detection method.  Power Consumption overhead measures the added Power Consumption which the detection method has caused to the network.
  • 5. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 High level overview of module operation Horizon 2020, Project No. 780139 4 1. The IoT network is reflected on a Graph structure where Nodes depict a set of network devices and Edges depict their interconnection links. 2. Intelligent Agents are positioned upon a set of Nodes (sensors, actuators, forwarders or servers) to monitor local devices and their connections. 3. Agents exchange traffic statistics information among their neighbors by engaging a Graph Neural Network algorithm. 4. Each Node is able to predict an anomaly score regarding itself and its adjacent neighbors’ status.
  • 6. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Graph Neural Networks methodology for anomaly detection Horizon 2020, Project No. 780139 4  A set of features (traffic data) is associated to each Node and Edge of the network.  Each agent deploying a Graph Neural Network algorithm with Edge and Node Deep Neural Networks (DNN) processes the feature vectors. • Edge DNN updates the features of neighboring nodes. • Node DNN uses the updated edge feature values to update the feature values of the specific node.  Two classifiers are responsible to predict anomalies in the neighborhood, and the specific Node.
  • 7. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Experimental results 7 Horizon 2020, Project No. 780139  The Proposed method was compared with SoA methods and Machine Learning techniques against several network traffic datasets to evaluate its performance. • Botnet CTU13 • IEEE Dataport IoT network intrusion attack dataset (TCP/SYN, UDP Flood, Port Scanning) • Infiltration attack simulated scenario • Worm attack propagation simulated scenario  Extensive experiments showcase the outperformance of the GNN detection method compared to similar mechanisms in terms of detection efficiency.
  • 8. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Experimental Resutls Portscan attack Detection method devices ROC score Accuracy GNN 99.00 99.00 SVM 91.36 91.36 Decision Tree 92.86 92.86 Random Forest 92.86 92.86 Infiltration attack Detection method devices ROC score Accuracy GNN 99.00 99.00 SVM 91.36 91.36 Decision Tree 92.86 92.86 Random Forest 92.86 92.86
  • 9. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Anomaly Detection interaction with Visual Analytics Dashboard 9 Horizon 2020, Project No. 780139 Anomaly detection recognizes five abnormal devices Active events are populated with abnormality details
  • 10. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 10 Horizon 2020, Project No. 780139 SerIoT project (2020), Deliverable ‘D4.6-Cross-layer anomaly detection framework’ - A. Protogerou, S. Papadopoulos, A. Drosou, D. Tzovaras, I. Refanidis, "A Graph Neural Network method for distributed Anomaly Detection in IoT", Evolving Systems (2020). - Yavuz, F.Y., ̈Unal, D., G ̈ul, E.: Deep learning for detection of routing attacks in theinternet of things. International Journal of Computational Intelligence Systems12(1),39–58 (2018) - Y. Meidan et al., "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders," in IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, Jul.-Sep. (2018). Related Publications