A lightweight IoT intrusion detection model based on improved BERT-of-Theseus

被引:22
作者
Wang, Zhendong [1 ]
Li, Jingfei [1 ]
Yang, Shuxin [1 ]
Luo, Xiao [2 ]
Li, Dahai [1 ]
Mahmoodi, Soroosh [3 ]
机构
[1] Jiangxi Univ Sci & Technol, Sch Informat Engn, Ganzhou 341000, Jiangxi, Peoples R China
[2] Jiangxi Univ Sci & Technol, Sch Elect Engn & Automat, Ganzhou 341000, Jiangxi, Peoples R China
[3] Yancheng Teachers Univ, Yancheng 224000, Jiangsu, Peoples R China
关键词
Intrusion detection; Internet of Things system; Knowledge distillation; Transformer; DETECTION SYSTEM; TON-IOT;
D O I
10.1016/j.eswa.2023.122045
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of Internet of Things (IoT) technology has resulted in an increase in security vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a need for intrusion detection mechanisms that can effectively detect attacks on IoT security vulnerabilities. However, due to the resource constraints of IoT deployment devices, intrusion detection schemes must be customized to meet the specific demands of the IoT environment. In this study, we propose a knowledge-distillation-based IoT intrusion detection model named BT-TPF, which is capable of detecting network attacks encountered by IoT devices in an IoT environment with limited computing resources. The proposed BT-TPF model leverages a Siamese network for feature dimensionality reduction of complex high-dimensional network traffic data. Additionally, it employs a large-scale Vision Transformer as a teacher model to guide a small-scale Poolformer model during training, before deploying the trained Poolformer model as a classifier to detect network intrusion traffic. Through knowledge distillation, the final small model obtained in this paper only requires a minimum of 788 parameters, reducing the number of parameters by approximately 90% compared to the large model before knowledge distillation, while maintaining high detection accuracy. Experimental results show that the BT-TPF model achieves over 99% accuracy on both the CIC-IDS2017 and TON_IoT datasets. Furthermore, it exhibits significant advantages compared to traditional Deep Learning methods and recent state-of-the-art models, as evidenced by various evaluation metrics.
引用
收藏
页数:18
相关论文
共 64 条
  • [1] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [2] TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah
    Moustafa, Nour
    Tari, Zahir
    Mahmood, Abdun
    Anwar, Adnan
    [J]. IEEE ACCESS, 2020, 8 : 165130 - 165150
  • [3] Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches
    Asadi, Mehdi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (12) : 5547 - 5561
  • [4] IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities
    Ashraf, Javed
    Keshk, Marwa
    Moustafa, Nour
    Abdel-Basset, Mohamed
    Khurshid, Hasnat
    Bakhshi, Asim D.
    Mostafa, Reham R.
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 72
  • [5] Ba J. L., 2016, arXiv, DOI DOI 10.48550/ARXIV.1607.06450
  • [6] Protecting Water Infrastructure From Cyber and Physical Threats Using multimodal data fusion and adaptive deep learning to monitor critical systems
    Bakalos, Nikolaos
    Voulodimos, Athanasios
    Doulamis, Nikolaos
    Doulamis, Anastasios
    Ostfeld, Avi
    Salomons, Elad
    Caubet, Juan
    Jimenez, Victor
    Li, Pau
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2019, 36 (02) : 36 - 48
  • [7] ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets
    Booij, Tim M.
    Chiscop, Irina
    Meeuwissen, Erik
    Moustafa, Nour
    den Hartog, Frank T. H.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 485 - 496
  • [8] Brown TB, 2020, ADV NEUR IN, V33
  • [9] Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Machado, Renato Bobsin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [10] Devlin J, 2019, Arxiv, DOI arXiv:1810.04805