Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks

被引:2
作者
Al-Na'amneh, Qais [1 ]
Aljaidi, Mohammad [2 ]
Nasayreh, Ahmad [3 ]
Gharaibeh, Hasan [3 ]
Al Mamlook, Rabia Emhamed [4 ,5 ]
Jaradat, Ameera S. [3 ]
Alsarhan, Ayoub [6 ]
Samara, Ghassan [2 ]
机构
[1] Appl Sci Private Univ, Fac Informat Technol, Dept Cyber Secur & Cloud Comp, Amman 11937, Jordan
[2] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa 13110, Jordan
[3] Yarmouk Univ, Dept Comp Sci Informat Technol & Comp Sci, Irbid 211633, Jordan
[4] Trine Univ, Dept Business Adm, POB 49008, Angola, IN 46703 USA
[5] Univ Zawia, Dept Ind Engn, POB 16418, Libia Al Zawiya City, Libya
[6] Hashemite Univ, Fac Prince Al Hussein Bin Abdallahfor Informat Tec, Dept Informat Technol, Zarqa 13116, Jordan
关键词
deep learning; machine learning; IoT networks; cyber-attack detection and classification; convolution neural network; INTERNET; MACHINE; ENVIRONMENT;
D O I
10.1515/jisys-2023-0150
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) has expanded into a realm of cutting-edge integrated solutions across numerous applications, following three stages of development: communication, authentication, and computing. However, each layer inside the three tier IoT architecture faces a spectrum of security concerns due to the IoT's openness, scope, and resource limits. Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. Despite developments in Intrusion Detection Systems, identifying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks in real-time remains a significant issue, especially in the environment of IoT devices, which are diverse and resource restricted. This study provides a Convolutional Neural Network-Support Vector Machine (CNN-SVM) hybrid technique, targeted at overcoming these limits by enhancing detection speed and accuracy, thus addressing this substantial gap in the area. This research offers a hybrid model that combines CNN for feature extraction with SVM as a classifier. This model employs a CNN to extract essential elements from the data and classifies attacks as either DDoS or benign. Our results highlight the potential performance of our model, which was trained on the real Canadian institute for cybersecurity (CIC) IoT dataset in 2023. Notably, our hybrid model outperformed classic machine learning (ML) alternatives such as CNN, SVM, K-nearest neighbors, Na & iuml;ve Bayes, and Logistic Regression. During testing, our model attained a remarkable accuracy rate of 99% and an F1-score of 99%, outperforming the highest-performing SVM ML model with an accuracy of 98% and the other ML methods.
引用
收藏
页数:25
相关论文
共 58 条
[1]  
Al Mamlook Rabia Emhamed, 2023, 2023 IEEE International Conference on Electro Information Technology (eIT), P265, DOI 10.1109/eIT57321.2023.10187283
[2]  
Al-Emran Mostafa, 2020, A survey of Internet of Things (IoT) in education: Opportunities and challenges, P197, DOI [10.1007/978-3-030-24513-9_12, DOI 10.1007/978-3-030-24513-9_12]
[3]  
Alam H., 2023, Computer Science Faculty Publications and Presentations, V119, DOI DOI 10.5121/IJCI.2023.120209
[4]   Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends [J].
Aldahmani, Aaesha ;
Ouni, Bassem ;
Lestable, Thierry ;
Debbah, Merouane .
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2023, 4 :281-292
[5]   Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network [J].
Ali, Shan ;
Li, Yuancheng .
IEEE ACCESS, 2019, 7 :108647-108659
[6]  
Aljaidi M., 2022, In 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), pp. 1
[7]  
Aljaidi M., 2022, 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), pp. 1
[8]   Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions [J].
Altulaihan, Esra ;
Almaiah, Mohammed Amin ;
Aljughaiman, Ahmed .
ELECTRONICS, 2022, 11 (20)
[9]  
[Anonymous], What is The CIA TRAID its important for Cybersecurity, https://websitesecuritystore.com/blog/what-is-the-cia-triad, 2021
[10]   DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning [J].
Asad, Muhammad ;
Asim, Muhammad ;
Javed, Talha ;
Beg, Mirza O. ;
Mujtaba, Hasan ;
Abbas, Sohail .
COMPUTER JOURNAL, 2020, 63 (07) :983-994