Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning

被引:1
作者
Ahmad, Basharat [1 ,2 ]
Wu, Zhaoliang [1 ,2 ]
Huang, Yongfeng [1 ,2 ]
Rehman, Sadaqat Ur [3 ]
机构
[1] Tsinghua Univ, Tsinghua Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[3] Univ Salford, Sch Sci Engn & Environm, Manchester M5 4WT, England
关键词
Internet of things (ioT); Industrial internet of things (IIoT); Intrusion detection system (IDS); Deep transfer learning (DTL); Cybersecurity; Lightweight IDS; INTERNET; THINGS;
D O I
10.1016/j.knosys.2024.112614
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) networks, which are defined by their interconnected devices and data streams are an expanding attack surface for cyber adversaries. Industrial Internet of Things (IIoT) is a subset of IoT and has significant importance in-terms of security. Robust intrusion detection systems (IDS) are essential for protecting these critical infrastructures. Our research suggests a novel approach to the detection of anomalies in IoT and IIoT networks that leverages the capabilities of deep transfer learning. Our methodology begins with the EdgeIIoT dataset, which serves as the basis for our data analysis. We convert the data into an appropriate image format to enable Convolutional Neural Network (CNN)-based processing. The hyper-parameters of individual machine learning models are subsequently optimized using a Random Search algorithm. This optimization phase optimizes the performance of each model by modifying the hyper-parameters that are unique to the learning algorithms. The performance of each model is meticulously assessed subsequent to hyper-parameter optimization. The top-performing models are subsequently, strategically selected and combined using the ensemble technique. The IDS scheme's overall detection accuracy and generalizability are improved by the integration of strengths from multiple models. The proposed scheme demonstrates significant effectiveness in identifying abroad spectrum of attacks, encompassing a total of 14 distinct attack types. This comprehensive detection capability contributes to amore secure and resilient IoT ecosystem. Furthermore, application of quantization to our best models reduces resource utilization significantly without compromising accuracy.
引用
收藏
页数:14
相关论文
共 39 条
  • [1] Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID
    Abosata, Nasr
    Al-Rubaye, Saba
    Inalhan, Gokhan
    [J]. SENSORS, 2023, 23 (01)
  • [2] Ensemble Methods for Instance-Based Arabic Language Authorship Attribution
    Al-Sarem, Mohammed
    Saeed, Faisal
    Alsaeedi, Abdullah
    Boulila, Wadii
    Al-Hadhrami, Tawfik
    [J]. IEEE ACCESS, 2020, 8 : 17331 - 17345
  • [3] Bergstra J, 2012, J MACH LEARN RES, V13, P281
  • [4] Transfer learning for raw network traffic detection
    Bierbrauer, David A.
    De Lucia, Michael J.
    Reddy, Krishna
    Maxwell, Paul
    Bastian, Nathaniel D.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2023, 211
  • [5] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [6] Xception: Deep Learning with Depthwise Separable Convolutions
    Chollet, Francois
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1800 - 1807
  • [7] Ensemble methods in machine learning
    Dietterich, TG
    [J]. MULTIPLE CLASSIFIER SYSTEMS, 2000, 1857 : 1 - 15
  • [8] Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning
    Ferrag, Mohamed Amine
    Friha, Othmane
    Hamouda, Djallel
    Maglaras, Leandros
    Janicke, Helge
    [J]. IEEE ACCESS, 2022, 10 : 40281 - 40306
  • [9] Howard AG, 2017, Arxiv, DOI [arXiv:1704.04861, DOI 10.48550/ARXIV.1704.04861]
  • [10] Distributed Transfer Network Learning Based Intrusion Detection
    Gou, Shuiping
    Wang, Yuqin
    Jiao, Licheng
    Feng, Jing
    Yao, Yao
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 511 - 515