CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks

被引:42
作者
Alabsi, Basim Ahmad [1 ]
Anbar, Mohammed [2 ]
Rihan, Shaza Dawood Ahmed [1 ]
机构
[1] Najran Univ, Appl Coll, Kind Abdulaziz St,Najran POB 1988, Najran, Saudi Arabia
[2] Univ Sains Malaysia, Natl Adv IPv6 NAv6 Ctr, Gelugor 11800, Malaysia
关键词
Internet of Things; IoT attacks; intrusion detection system; feature selection; convolutional neural network;
D O I
10.3390/s23146507
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) has brought significant advancements that have connected our world more closely than ever before. However, the growing number of connected devices has also increased the vulnerability of IoT networks to several types of attacks. In this paper, we present an approach for detecting attacks on IoT networks using a combination of two convolutional neural networks (CNN-CNN). The first CNN model is leveraged to select the significant features that contribute to IoT attack detection from the raw data on network traffic. The second CNN utilizes the features identified by the first CNN to build a robust detection model that accurately detects IoT attacks. The proposed approach is evaluated using the BoT IoT 2020 dataset. The results reveal that the proposed approach achieves 98.04% detection accuracy, 98.09% precision, 99.85% recall, 98.96% recall, and a 1.93% false positive rate (FPR). Furthermore, the proposed approach is compared with other deep learning algorithms and feature selection methods; the results show that it outperforms these algorithms.
引用
收藏
页数:17
相关论文
共 48 条
[1]   Anomaly Detection Using Deep Neural Network for IoT Architecture [J].
Ahmad, Zeeshan ;
Khan, Adnan Shahid ;
Nisar, Kashif ;
Haider, Iram ;
Hassan, Rosilah ;
Haque, Muhammad Reazul ;
Tarmizi, Seleviawati ;
Rodrigues, Joel J. P. C. .
APPLIED SCIENCES-BASEL, 2021, 11 (15)
[2]   A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Bahashwan, Abdullah Ahmed ;
Hasbullah, Iznan Husainy ;
Aladaileh, Mohammad Adnan ;
AL Mukhaini, Ghada .
INTERNET OF THINGS, 2023, 22
[3]   A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Kabla, Arkan Hammoodi Hasan ;
Hasbullah, Iznan H. ;
Alashhab, Ziyad R. .
SENSORS, 2022, 22 (09)
[4]   Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network [J].
Al-Ani, Ahmed K. ;
Anbar, Mohammed ;
Al-Ani, Ayman ;
Ibrahim, Dyala R. .
IEEE ACCESS, 2020, 8 :27122-27138
[5]  
Al-Sarawi S, 2020, PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), P449, DOI 10.1109/WorldS450073.2020.9210375
[6]  
Al-Shalabi M., 2019, J. Theor. Appl. Inf. Technol. (JATIT), V97, P2132
[7]  
Alalousi A, 2016, International Journal of Electrical and Computer Engineering (IJECE), V6, P778, DOI [10.11591/ijece.v6i2.8909, 10.11591/ijece.v6i1.8909, DOI 10.11591/IJECE.V6I1.8909]
[8]  
Alamiedy Taief Alaa, 2021, Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science (1487), P340, DOI 10.1007/978-981-16-8059-5_21
[9]  
Alasadi SuadA., 2017, J ENG APPL SCI, V12, P4102, DOI [DOI 10.3923/JEASCI.2017.4102.4107, 10.36478/jeasci.2017.4102.4107, DOI 10.36478/JEASCI.2017.4102.4107]
[10]  
Ali P.J. M., 2014, Machine Learning Technical Reports, V1, P1, DOI [10.1542/peds.2012-1990, DOI 10.13140/RG.2.2.28948.04489, 10.13140/RG.2.2.28948.04489]