IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices

被引:2
作者
Ericson, Amanda [1 ]
Forsstrom, Stefan [1 ]
Thar, Kyi [1 ]
机构
[1] Mid Sweden Univ, Dept Comp & Elect Engn, Sundsvall, Sweden
来源
2024 IEEE 20TH INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS, WFCS | 2024年
关键词
Network security; NIDS; Deep learning; Machine learning; UNSW-NB15; Network attacks; TinyML; IIoT; Edge computing;
D O I
10.1109/WFCS60972.2024.10540991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the rapidly evolving cybersecurity landscape, detecting and preventing network attacks has become crucial within the industrial sector. This study aims to explore the potential of intrusion detection by employing deep learning within edge computing, especially for the Industrial Internet of Things. Specifically, TinyML converted CNN, LSTM, Transformer-LSTM, and GCN models on the UNSW-NB15 dataset. A comprehensive dataset analysis gained insights into the nature of attack behavior data. Subsequently, a comparative analysis in an edge computing setup using Raspberry Pi units revealed that the GCN model, with its accuracy of 97.5%, was the best suited of the compared models for this application. However, the study also explored variables like time consumption, where the CNN model was the fastest out of the compared models. This research also highlights the need for continued exploration, especially in addressing dataset imbalances and enhancing model generalizability. By recognizing each model's strengths and areas of improvement, this research serves as a step toward bolstering digital safety and security in an increasingly interconnected industrial world.
引用
收藏
页码:127 / 134
页数:8
相关论文
共 18 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]   A hybrid intrusion detection system design for computer network security [J].
Aydin, M. Ali ;
Zaim, A. Halim ;
Ceylan, K. Goekhan .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) :517-526
[3]   TinyML Meets IoT: A Comprehensive Survey [J].
Dutta, Lachit ;
Bharali, Swapna .
INTERNET OF THINGS, 2021, 16
[4]  
Javaid A, 2016, ACM, P21, DOI DOI 10.4108/EAI.3-12-2015.2262516
[5]  
Kabir M. Firoz, 2018, 2018 International Young Engineers Forum (YEF-ECE). Proceedings, P19, DOI 10.1109/YEF-ECE.2018.8368933
[6]   An IoT-Focused Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets [J].
Larriva-Novo, Xavier ;
Villagra, Victor A. ;
Vega-Barbas, Mario ;
Rivera, Diego ;
Sanz Rodrigo, Mario .
SENSORS, 2021, 21 (02) :1-15
[7]  
Luying Zhou, 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), P214, DOI 10.1109/SOLI.2018.8476769
[8]  
Malek ZS, 2020, PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), P549, DOI 10.1109/WorldS450073.2020.9210368
[9]   A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems [J].
Masdari, Mohammad ;
Khezri, Hemn .
APPLIED SOFT COMPUTING, 2020, 92
[10]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)