AI-Based Intrusion Detection for a Secure Internet of Things (IoT)

被引:2
作者
Aljohani, Reham [1 ]
Bushnag, Anas [1 ]
Alessa, Ali [2 ]
机构
[1] Univ Tabuk, Fac Comp & Informat Technol, Tabuk, Saudi Arabia
[2] Inst Publ Adm, Dept Digital Transformat & Informat, Riyadh, Saudi Arabia
关键词
Internet of things (IoT); Intrusion detection system (IDS); Artificial intelligence (AI); Machine learning (ML); Deep learning (DL); SYSTEMS;
D O I
10.1007/s10922-024-09829-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific goal. Smart cities, smart airports, smart transportation, smart homes, and many applications in the medical and educational fields all use the IoT. However, one major challenge is detecting malicious intrusions on IoT networks. Intrusion Detection Systems (IDSs) should detect these types of intrusions. This work proposes an effective model for detecting malicious IoT activities using machine learning techniques. The ToN-IoT dataset, which consists of seven connected devices (subdatasets), is used to construct an IoT network. The proposed model is a multilevel classification model. The first level distinguishes between attack and normal network activities. The second level is to classify the types of detected attacks. The experimental results prove the effectiveness of the proposed model in terms of time and classification performance metrics. The proposed model and seven baseline techniques in the literature are compared. The proposed model outperformed the baseline techniques in all subdatasets except for the Garage Door dataset.
引用
收藏
页数:40
相关论文
共 38 条
[1]  
Abbasi MM., 2017, J. Netw. Comput. Appl, V84, P23
[2]  
Al-Emadi S., 2020, 2020 IEEE INT C INF
[3]  
Al-Qerm I., 2020, J. Ambient. Intell. Humaniz. Comput, V11, P1665
[4]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[5]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[6]  
Alsamiri Jadel, 2019, International Journal of Advanced Computer Science and Applications, V10, P627
[7]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[8]   An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks [J].
Awotunde, Joseph Bamidele ;
Folorunso, Sakinat Oluwabukonla ;
Imoize, Agbotiname Lucky ;
Odunuga, Julius Olusola ;
Lee, Cheng-Chi ;
Li, Chun-Ta ;
Do, Dinh-Thuan .
APPLIED SCIENCES-BASEL, 2023, 13 (04)
[9]   Internet of Things devices appropriation process: The Dynamic Interactions Value Appropriation (DIVA) framework [J].
Benamar, Lamya ;
Balague, Christine ;
Zhong, Zeling .
TECHNOVATION, 2020, 89
[10]  
Bhuyan MH., 2019, J. Netw. Comput. Appl, V126, P56