An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification

被引:10
作者
Wang, Huan [1 ,2 ,3 ]
Di, Xiaoqiang [4 ]
Wang, Yan [1 ,2 ,3 ]
Ren, Bin [5 ]
Gao, Ge [1 ]
Deng, Junyi [1 ,2 ,3 ]
机构
[1] Guangxi Univ Sci & Technol, Sch Comp Sci & Technol, Liuzhou 545006, Guangxi, Peoples R China
[2] Liuzhou Key Lab Big Data Intelligent Proc & Secur, Liuzhou 545006, Guangxi, Peoples R China
[3] Guangxi Educ Syst Network Secur Monitoring Ctr, Liuzhou 545006, Guangxi, Peoples R China
[4] Changchun Univ Sci & Technol, Jilin Prov Key Lab Network & Informat Secur, Changchun 130022, Peoples R China
[5] Changchun Inst Technol, Changchun 130012, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Feature extraction; Digital twins; Data models; Security; Behavioral sciences; Analytical models; Digital twin; IoT security; parallel model; attack identification; spatio-temporal feature fusion; MODEL;
D O I
10.1109/JSAC.2023.3310091
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network attack identification effectively secures Internet of Things (IoT) application scenarios. However, dynamic scene changes, attack feature reliance, high data dimensions, and challenges with spatio-temporal feature fusion frequently pose limitations to attack traffic identification in IoT contexts. Definitive intelligent IoT attack identification enables intelligent algorithms to extract attack features for application scenarios with fixed topological environments but cannot construct the intricate changes of IoT application scenarios. Through the dynamic acquisition, feature awareness, and deep learning, intelligent digital twin-based attack detection can address these issues and enhance attack identification for IoT threats. Thus, this paper proposed an intelligent digital twin method based on spatio-temporal feature fusion for IoT attack behavior identification. Firstly, feature subsets are selected based on information gain to reduce the dimensionality of IoT data with high traffic; Secondly, a parallel spatio-temporal feature extraction model is designed unlike the existing tandem model, which uses a simplified Convolutional Neural Networks (CNN) model to learn the spatial features of the attack, a Bi-directional Long Short-Term Memory (BiLSTM) model to learn the temporal features of the attack, an attention mechanism to fuse the temporal and spatial features, and the (Deep Neural Networks) DNN to learn the combined features; Finally, the virtual instance space and topology of the attack scenario are simulated using digital twin (DT) to build a digital version of the complex system for IoT applications and tested in a simulation environment. Based on experimental results using the UNSW-NB15 and CICIDS2017 datasets, this paper shows that the proposed method can extract spatio-temporal features from network attack traffic and has a 5% improvement in test accuracy.
引用
收藏
页码:3561 / 3572
页数:12
相关论文
共 42 条
  • [1] An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment
    Alam, Gowthul M. M.
    Kumar, Jerald Nirmal S.
    Mageswari, Uma R.
    Raj, Michael T. F.
    [J]. COMPUTER NETWORKS, 2022, 215
  • [2] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [3] Intelligent Intrusion Detection Using Arithmetic Optimization Enabled Density Based Clustering with Deep Learning
    Alrowais, Fadwa
    Marzouk, Radwa
    Nour, Mohamed K.
    Mohsen, Heba
    Hilal, Anwer Mustafa
    Yaseen, Ishfaq
    Alsaid, Mohamed Ibrahim
    Mohammed, Gouse Pasha
    [J]. ELECTRONICS, 2022, 11 (21)
  • [4] A Many-Objective Optimization Based Federal Deep Generation Model for Enhancing Data Processing Capability in IoT
    Cai, Xingjuan
    Lan, Yang
    Zhang, Zhixia
    Wen, Jie
    Cui, Zhihua
    Zhang, Wensheng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 561 - 569
  • [5] Optimal Placement of Social Digital Twins in Edge IoT Networks
    Chukhno, Olga
    Chukhno, Nadezhda
    Araniti, Giuseppe
    Campolo, Claudia
    Iera, Antonio
    Molinaro, Antonella
    [J]. SENSORS, 2020, 20 (21) : 1 - 17
  • [6] Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
    Dong, Rui-Hong
    Li, Xue-Yong
    Zhang, Qiu-Yu
    Yuan, Hui
    [J]. IET INFORMATION SECURITY, 2020, 14 (02) : 166 - 174
  • [7] Point Spatio-Temporal Transformer Networks for Point Cloud Video Modeling
    Fan, Hehe
    Yang, Yi
    Kankanhalli, Mohan
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 2181 - 2192
  • [8] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [9] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [10] Omni SCADA Intrusion Detection Using Deep Learning Algorithms
    Gao, Jun
    Gan, Luyun
    Buschendorf, Fabiola
    Zhang, Liao
    Liu, Hua
    Li, Peixue
    Dong, Xiaodai
    Lu, Tao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 951 - 961