A lightweight IoT intrusion detection model based on improved BERT-of-Theseus

被引:38
作者
Wang, Zhendong [1 ]
Li, Jingfei [1 ]
Yang, Shuxin [1 ]
Luo, Xiao [2 ]
Li, Dahai [1 ]
Mahmoodi, Soroosh [3 ]
机构
[1] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou 341000, Jiangxi, Peoples R China
[2] Jiangxi Univ Sci & Technol, Sch Elect Engn & Automat, Ganzhou 341000, Jiangxi, Peoples R China
[3] Yancheng Teachers Univ, Yancheng 224000, Jiangsu, Peoples R China
关键词
Intrusion detection; Internet of Things system; Knowledge distillation; Transformer; DETECTION SYSTEM; TON-IOT;
D O I
10.1016/j.eswa.2023.122045
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of Internet of Things (IoT) technology has resulted in an increase in security vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a need for intrusion detection mechanisms that can effectively detect attacks on IoT security vulnerabilities. However, due to the resource constraints of IoT deployment devices, intrusion detection schemes must be customized to meet the specific demands of the IoT environment. In this study, we propose a knowledge-distillation-based IoT intrusion detection model named BT-TPF, which is capable of detecting network attacks encountered by IoT devices in an IoT environment with limited computing resources. The proposed BT-TPF model leverages a Siamese network for feature dimensionality reduction of complex high-dimensional network traffic data. Additionally, it employs a large-scale Vision Transformer as a teacher model to guide a small-scale Poolformer model during training, before deploying the trained Poolformer model as a classifier to detect network intrusion traffic. Through knowledge distillation, the final small model obtained in this paper only requires a minimum of 788 parameters, reducing the number of parameters by approximately 90% compared to the large model before knowledge distillation, while maintaining high detection accuracy. Experimental results show that the BT-TPF model achieves over 99% accuracy on both the CIC-IDS2017 and TON_IoT datasets. Furthermore, it exhibits significant advantages compared to traditional Deep Learning methods and recent state-of-the-art models, as evidenced by various evaluation metrics.
引用
收藏
页数:18
相关论文
共 64 条
[1]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[2]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[3]   Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches [J].
Asadi, Mehdi .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (12) :5547-5561
[4]   IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities [J].
Ashraf, Javed ;
Keshk, Marwa ;
Moustafa, Nour ;
Abdel-Basset, Mohamed ;
Khurshid, Hasnat ;
Bakhshi, Asim D. ;
Mostafa, Reham R. .
SUSTAINABLE CITIES AND SOCIETY, 2021, 72
[5]  
Ba J.L., 2016, arXiv preprint arXiv:1607.06450, DOI DOI 10.48550/ARXIV.1607.06450
[6]   Protecting Water Infrastructure From Cyber and Physical Threats Using multimodal data fusion and adaptive deep learning to monitor critical systems [J].
Bakalos, Nikolaos ;
Voulodimos, Athanasios ;
Doulamis, Nikolaos ;
Doulamis, Anastasios ;
Ostfeld, Avi ;
Salomons, Elad ;
Caubet, Juan ;
Jimenez, Victor ;
Li, Pau .
IEEE SIGNAL PROCESSING MAGAZINE, 2019, 36 (02) :36-48
[7]   ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets [J].
Booij, Tim M. ;
Chiscop, Irina ;
Meeuwissen, Erik ;
Moustafa, Nour ;
den Hartog, Frank T. H. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :485-496
[8]  
Brown TB, 2020, ADV NEUR IN, V33
[9]   Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments [J].
de Souza, Cristiano Antonio ;
Westphall, Carlos Becker ;
Machado, Renato Bobsin .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
[10]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, DOI 10.48550/ARXIV.1810.04805]