StaEn-IDS: An Explainable Stacking Ensemble Deep Neural Network-Based Intrusion Detection System for IoT

被引:0
作者
Vishwakarma, Monika [1 ]
Kesswani, Nishtha [2 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur 303007, India
[2] Cent Univ Rajasthan, Dept Data Sci & Analyt, Ajmer 305817, India
关键词
Internet of Things; Long short term memory; Stacking; Accuracy; Ensemble learning; Convolutional neural networks; Intrusion detection; Random forests; Security; Neurons; Deep learning (DL); convolutional neural network (CNN); long short-term memory (LSTM); intrusion detection system (IDS); stacking method; ensemble technique; explainable AI (XAI);
D O I
10.1109/ACCESS.2025.3582391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for the Internet of Things (IoT) has increased exponentially because it connects devices, applications, and people, allowing smooth real-time communication and data sharing. This connectivity improves decision-making, making it more accurate and efficient. However, this also increases security risks. With millions of connected devices from different manufacturers using various protocols and IoT applications, ensuring IoT security is challenging. Moreover, IoT devices often have limited processing power and storage, making it harder to apply strong security measures, giving attackers an advantage. Single models can face issues like overfitting or being vulnerable to attacks. Combining multiple learning methods through ensemble techniques has effectively addressed these issues and improved performance. This paper proposes a stacking ensemble model. The approach integrates a Deep Intrusion Detection System (DIDS) with a Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) model. The Random Forest algorithm is used as a meta-classifier in the stacking process to improve accuracy. The model also addresses the challenge of detecting minority-class attacks in IoT traffic. We evaluate the approach on data derived from the CIC IoT 2022 dataset (pcap files converted to flow records using CICFlowMeter), and demonstrate real-time deployment on a resource-constrained edge device. Furthermore, we incorporate Explainable AI techniques to interpret the model's decisions, thereby improving user trust in the system. Our results show that the proposed model effectively and robustly detects intrusions in IoT environments.
引用
收藏
页码:109713 / 109728
页数:16
相关论文
共 35 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]   Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) [J].
Adadi, Amina ;
Berrada, Mohammed .
IEEE ACCESS, 2018, 6 :52138-52160
[3]   Intrusion Detection Systems, Issues, Challenges, and Needs [J].
Aljanabi, Mohammad ;
Ismail, Mohd Arfian ;
Ali, Ahmed Hussein .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2021, 14 (01) :560-571
[4]  
[Anonymous], Mutual_info_classif-scikit-learn 1.6.1 Documentation
[5]   HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Things Network [J].
Berguiga, Abdelwahed ;
Harchay, Ahlem ;
Massaoudi, Ayman .
IEEE ACCESS, 2025, 13 :38404-38429
[6]   An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis [J].
Chowdhury, Ratul ;
Sen, Shibaprasad ;
Roy, Arindam ;
Saha, Banani .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) :41225-41247
[7]   Towards the Development of a Realistic Multidimensional IoT Profiling Dataset [J].
Dadkhah, Sajjad ;
Mahdikhani, Hassan ;
Danso, Priscilla Kyei ;
Zohourian, Alireza ;
Truong, Kevin Anh ;
Ghorbani, Ali A. .
2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
[8]   Explainable AI (XAI): Core Ideas, Techniques, and Solutions [J].
Dwivedi, Rudresh ;
Dave, Devam ;
Naik, Het ;
Singhal, Smiti ;
Omer, Rana ;
Patel, Pankesh ;
Qian, Bin ;
Wen, Zhenyu ;
Shah, Tejal ;
Morgan, Graham ;
Ranjan, Rajiv .
ACM COMPUTING SURVEYS, 2023, 55 (09)
[9]  
Farhan RI., 2020, Indonesian J Electr Eng Comput Sci, V20, P1413, DOI DOI 10.11591/IJEECS.V20.I3.PP1413-1418
[10]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50