CKAN: Convolutional Kolmogorov-Arnold Networks Model for Intrusion Detection in IoT Environment

被引:13
作者
Abd Elaziz, Mohamed [1 ,2 ,4 ]
Fares, Ibrahim Ahmed [1 ]
Aseeri, Ahmad O. [3 ,5 ]
机构
[1] Zagazig Univ, Fac Sci, Dept Math, Zagazig 44519, Egypt
[2] Galala Univ, Fac Comp Sci & Engn, Dept Math, Suze 43511, Egypt
[3] Ajman Univ, Artificial Intelligence Res Ctr AIRC, Ajman, U Arab Emirates
[4] Middle East Univ, MEU Res Unit, Amman 11831, Jordan
[5] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Al Kharj 11942, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Convolutional neural networks; Computer architecture; Accuracy; Splines (mathematics); Computational modeling; Deep learning; Intrusion detection; Kolmogorov-Arnold networks (KANs); multi-layer perceptrons; deep learning; intrusion detection systems (IDS); IoT;
D O I
10.1109/ACCESS.2024.3462297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel Convolutional Kolmogorov-Arnold Network (CKAN) model for Intrusion Detection Systems (IDS) in an IoT environment. The CKAN model is developed by replacing the Multi-Layer Perceptrons (MLPs) layers with Kolmogorov-Arnold Networks (KANs) layers inside the Convolutional Neural Networks (CNN) architecture. The KANs give high performance compared to the MLPs layers with fewer parameters. The performance of the proposed CKAN model has been evaluated against other well-known Deep Learning (DL) models like CNN, recurrent neural networks (RNN), and Autoencoder. The evaluation process has been carried out with three benchmark datasets: NSL_KDD, which is treated as a standard IDS dataset; CICIoT2023; TONIoT, which are IoT IDS datasets. The results point out the superiority of the CKAN model over other DL models for both binary and multi-classification tasks as per the accuracy, precision, recall, and F1 score. The proposed CKAN model achieved accuracies of 98.71%, 99.22%, and 99.93% for binary classification, and 99.2%, 98.84%, and 93.3% for multi-classification on the NSL_KDD, CICIoT2023, and TONIoT datasets, respectively. The CKAN model gives better performance metrics with a smaller number of parameters compared to other DL models. In this way, our findings point out that KANs are promising for being a substitute for MLPs.
引用
收藏
页码:134837 / 134851
页数:15
相关论文
共 28 条
[1]   Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
AD HOC NETWORKS, 2017, 56 :122-140
[2]  
Babu B.Sankara, 2023, 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), P367, DOI 10.1109/ICSMDI57622.2023.00071
[3]   ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets [J].
Booij, Tim M. ;
Chiscop, Irina ;
Meeuwissen, Erik ;
Moustafa, Nour ;
den Hartog, Frank T. H. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :485-496
[4]  
Chimphlee W., 2024, IAES Int. J. Artif. Intell. IJ-AI, V30, P1106, DOI DOI 10.11591/IJAI.V13.I1.PP817-826
[5]   TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection [J].
Ding, Hongwei ;
Sun, Yu ;
Huang, Nana ;
Shen, Zhidong ;
Cui, Xiaohui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :1156-1167
[6]   Expanding analytical capabilities in intrusion detection through ensemble-based multi-label classification [J].
Hallaji, Ehsan ;
Razavi-Far, Roozbeh ;
Saif, Mehrdad .
COMPUTERS & SECURITY, 2024, 139
[7]  
Kalaivani A., 2023, Data Anal. Artif. Intell., V3, P132
[8]   Backpropagation Applied to Handwritten Zip Code Recognition [J].
LeCun, Y. ;
Boser, B. ;
Denker, J. S. ;
Henderson, D. ;
Howard, R. E. ;
Hubbard, W. ;
Jackel, L. D. .
NEURAL COMPUTATION, 1989, 1 (04) :541-551
[9]   Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network [J].
Liu, Zhipeng ;
Hu, Junyi ;
Liu, Yang ;
Roy, Kaushik ;
Yuan, Xiaohong ;
Xu, Jinsheng .
IEEE ACCESS, 2023, 11 :91116-91132
[10]  
Liu ZM, 2025, Arxiv, DOI arXiv:2404.19756