Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection

被引:1
作者
Abdelhamid, Salma [1 ]
Hegazy, Islam [2 ]
Aref, Mostafa [2 ]
Roushdy, Mohamed [2 ]
机构
[1] Future Univ Egypt, Fac Comp & Informat Technol, Comp Sci Dept, Cairo 11835, Egypt
[2] Ain Shams Univ, Fac Comp & Informat Sci, Comp Sci Dept, Cairo 11566, Egypt
关键词
attention mechanism; deep learning; ensemble learning; Internet of Things; intrusion detection; transfer learning;
D O I
10.3390/bdcc8090116
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of Internet of Things (IoT) devices has become inevitable in contemporary life, significantly affecting myriad applications. Nevertheless, the pervasive use of heterogeneous IoT gadgets introduces vulnerabilities to malicious cyber-attacks, resulting in data breaches that jeopardize the network's integrity and resilience. This study proposes an Intrusion Detection System (IDS) for IoT environments that leverages Transfer Learning (TL) and the Convolutional Block Attention Module (CBAM). We extensively evaluate four prominent pre-trained models, each integrated with an independent CBAM at the uppermost layer. Our methodology is validated using the BoT-IoT dataset, which undergoes preprocessing to rectify the imbalanced data distribution, eliminate redundancy, and reduce dimensionality. Subsequently, the tabular dataset is transformed into RGB images to enhance the interpretation of complex patterns. Our evaluation results demonstrate that integrating TL models with the CBAM significantly improves classification accuracy and reduces false-positive rates. Additionally, to further enhance the system performance, we employ an Ensemble Learning (EL) technique to aggregate predictions from the two best-performing models. The final findings prove that our TL-CBAM-EL model achieves superior performance, attaining an accuracy of 99.93% as well as high recall, precision, and F1-score. Henceforth, the proposed IDS is a robust and efficient solution for securing IoT networks.
引用
收藏
页数:23
相关论文
共 59 条
[1]  
Abadi M., 2016, arXiv, DOI [10.48550/arXiv.1603.04467., DOI 10.48550/ARXIV.1603.04467]
[2]  
Abdelhamid S., 2021, P 2021 10 INT C INT
[3]   On the Use of a Convolutional Block Attention Module in Deep Learning-Based Human Activity Recognition with Motion Sensors [J].
Agac, Sumeyye ;
Incel, Ozlem Durmaz .
DIAGNOSTICS, 2023, 13 (11)
[4]   A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) :9463-9472
[5]   Hybrid Metaheuristics With Machine Learning Based Botnet Detection in Cloud Assisted Internet of Things Environment [J].
Almuqren, Latifah ;
Alqahtani, Hamed ;
Aljameel, Sumayh S. ;
Salama, Ahmed S. ;
Yaseen, Ishfaq ;
Alneil, Amani A. .
IEEE ACCESS, 2023, 11 :115668-115676
[6]   Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security [J].
Alotaibi, Yazeed ;
Ilyas, Mohammad .
SENSORS, 2023, 23 (12)
[7]  
[Anonymous], 2024, High Strength Steel Market
[8]   A Novel Deep Learning-Based Intrusion Detection System for IoT Networks [J].
Awajan, Albara .
COMPUTERS, 2023, 12 (02)
[9]   An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks [J].
Awotunde, Joseph Bamidele ;
Folorunso, Sakinat Oluwabukonla ;
Imoize, Agbotiname Lucky ;
Odunuga, Julius Olusola ;
Lee, Cheng-Chi ;
Li, Chun-Ta ;
Do, Dinh-Thuan .
APPLIED SCIENCES-BASEL, 2023, 13 (04)
[10]   Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks [J].
Bazgir, Omid ;
Zhang, Ruibo ;
Dhruba, Saugato Rahman ;
Rahman, Raziur ;
Ghosh, Souparno ;
Pal, Ranadip .
NATURE COMMUNICATIONS, 2020, 11 (01)