A Novel Lightweight IoT Intrusion Detection Model Based on Self-Knowledge Distillation

被引:3
作者
Wang, Zhendong [1 ]
Zhou, Renqiang [1 ]
Yang, Shuxin [1 ]
He, Daojing [2 ]
Chan, Sammy [3 ]
机构
[1] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou 341000, Peoples R China
[2] Harbin Inst Technol Shenzhen, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
关键词
Computational modeling; Internet of Things; Accuracy; Feature extraction; Intrusion detection; Computational efficiency; Security; Analytical models; Principal component analysis; Real-time systems; Internet of Things (IoT); intrusion detection; lightweight neural network (LNN); self-knowledge distillation (SKD);
D O I
10.1109/JIOT.2025.3533092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) environment contains many different types of devices, each with different functionalities, communication protocols, and security capabilities, which makes the IoT a complex challenge for security protection. Therefore, network intrusion detection (NID) is needed to detect intrusions in the network to secure the IoT. In recent years, deep learning (DL)-based intrusion detection systems have achieved excellent results, but they tend to require high-computational resources and storage space, which is not feasible for most IoT devices. In this article, we propose a lightweight intrusion detection model based on self-knowledge distillation (SKD), namely, tied block convolution lightweight deep neural network (TBCLNN), which improves the detection accuracy while also reducing the number of model parameters and computational cost. Specifically, we use the binary Harris Hawk optimization algorithm (bHHO) for dimensionality reduction of traffic features. We use lightweight convolution, such as tied block convolution (TBC), to design lightweight neural network (LNN) models with residual and inverse residual structures. Moreover, we propose an improved SKD loss function to solve the sample imbalance problem and compensate for the performance degradation caused by lightweight neural networks. The multiclassification accuracy of our proposed method exceeds 99% on all three publicly available IoT datasets. The experimental results show that our method has a small model size and requires only low-computational resources, making it suitable for resource-constrained IoT intrusion detection.
引用
收藏
页码:16912 / 16930
页数:19
相关论文
共 39 条
[1]   Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm [J].
Abd Elaziz, Mohamed ;
Al-qaness, Mohammed A. A. ;
Dahou, Abdelghani ;
Ibrahim, Rehab Ali ;
Abd El-Latif, Ahmed A. .
ADVANCES IN ENGINEERING SOFTWARE, 2023, 176
[2]   Binary Harris Hawks Optimisation Filter Based Approach for Feature Selection [J].
Abu Khurma, Ruba ;
Awadallah, Mohammed A. ;
Aljarah, Ibrahim .
2021 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT 2021), 2021, :59-64
[3]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[4]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[5]   Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors [J].
Azimjonov, Jahongir ;
Kim, Taehong .
COMPUTERS & SECURITY, 2024, 137
[6]   Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets [J].
Azimjonov, Jahongir ;
Kim, Taehong .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
[7]   Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy [J].
Devendiran, Ramkumar ;
Turukmane, Anil, V .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 245
[8]   DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks [J].
Ding, Weiping ;
Abdel-Basset, Mohamed ;
Mohamed, Reda .
INFORMATION SCIENCES, 2023, 634 :157-171
[9]  
Gad AR, 2022, INT J ADV COMPUT SC, V13, P548
[10]  
Gong YC, 2014, Arxiv, DOI arXiv:1412.6115