Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence

被引:1
作者
Bar, Shachar [1 ]
Prasad, P. W. C. [2 ]
Sayeed, Md Shohel [3 ]
机构
[1] Charles Sturt Univ, Sch Comp, Math, Bathurst, NSW 2795, Australia
[2] Duy Tan Univ, Int Sch, Da Nang 550000, Vietnam
[3] Multimedia Univ, Fac Informat Sci & Technol, Melaka 75450, Malaysia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 81卷 / 01期
关键词
Anomaly detection; artificial intelligence; cyber security; data privacy; deep learning; federated learning; industrial internet of things; internet of things; intrusion detection system; machine learning; LEARNING-MODELS;
D O I
10.32604/cmc.2024.053861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Escalating cyber security threats and the increased use of Internet of Things (IoT) devices require utilisation of the latest technologies available to supply adequate protection. The aim of Intrusion Detection Systems (IDS) is to prevent malicious attacks that corrupt operations and interrupt data flow, which might have significant impact on critical industries and infrastructure. This research examines existing IDS, based on Artificial Intelligence (AI) for IoT devices, methods, and techniques. The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy, precision, recall and F1-score; this research also considers training time. Results demonstrate that Graph Neural Networks (GNN) have several benefits over other traditional AI frameworks through their ability to achieve in excess of 99% accuracy in a relatively short training time, while also capable of learning from network traffic the inherent characteristics of different cyber-attacks. These findings identify the GNN (a Deep Learning AI method) as the most efficient IDS system. The novelty of this research lies also in the linking between high yielding AI-based IDS algorithms and the AI-based learning approach for data privacy protection. This research recommends Federated Learning (FL) as the AI training model, which increases data privacy protection and reduces network data flow, resulting in a more secure and efficient IDS solution.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 81 条
[1]   A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond [J].
AbdulRahman, Sawsan ;
Tout, Hanine ;
Ould-Slimane, Hakima ;
Mourad, Azzam ;
Talhi, Chamseddine ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5476-5497
[2]   Deep learning-enabled anomaly detection for IoT systems [J].
Abusitta, Adel ;
de Carvalho, Glaucio H. S. ;
Wahab, Omar Abdel ;
Halabi, Talal ;
Fung, Benjamin C. M. ;
Al Mamoori, Saja .
INTERNET OF THINGS, 2023, 21
[3]  
Agarwal P., 2022, IoT for Sustainable Smart Cities and Society., DOI [10.1007/978-3-030-89554-91, DOI 10.1007/978-3-030-89554-91]
[4]   An explainable efficient flow-based Industrial IoT intrusion detection system [J].
Alani, Mohammed M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
[5]   Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network [J].
Alshahrani, Hani ;
Khan, Attiya ;
Rizwan, Muhammad ;
Reshan, Mana Saleh Al ;
Sulaiman, Adel ;
Shaikh, Asadullah .
SUSTAINABILITY, 2023, 15 (11)
[6]   A new concatenated Multigraph Neural Network for IoT intrusion detection [J].
Altaf, Tanzeela ;
Wang, Xu ;
Ni, Wei ;
Yu, Guangsheng ;
Liu, Ren Ping ;
Braun, Robin .
INTERNET OF THINGS, 2023, 22
[7]   Review of deep learning: concepts, CNN architectures, challenges, applications, future directions [J].
Alzubaidi, Laith ;
Zhang, Jinglan ;
Humaidi, Amjad J. ;
Al-Dujaili, Ayad ;
Duan, Ye ;
Al-Shamma, Omran ;
Santamaria, J. ;
Fadhel, Mohammed A. ;
Al-Amidie, Muthana ;
Farhan, Laith .
JOURNAL OF BIG DATA, 2021, 8 (01)
[8]   An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation [J].
Anh-Tu Tran ;
The-Dung Luong ;
Karnjana, Jessada ;
Van-Nam Huynh .
NEUROCOMPUTING, 2021, 422 :245-262
[9]  
Arslan M., 2024, Accelerators for Convolutional Neural Networks., DOI [10.1002/9781394171910, DOI 10.1002/9781394171910]
[10]  
Bajpai S., 2023, SN Comput. Sci. J., V4, P1, DOI [10.1007/s42979-023-01770-9, DOI 10.1007/S42979-023-01770-9]