A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

被引:86
作者
Awajan, Albara [1 ]
机构
[1] Al Balqa Appl Univ, Fac Artificial Intelligence, Dept Intelligent Syst, Al Salt 19117, Jordan
关键词
intrusion detection system (IDS); Internet of Things (IoT); deep learning (DL); machine learning; communication protocol; FC network; MALWARE;
D O I
10.3390/computers12020034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim. Attacks on IoT, if they remain undetected for an extended period, cause severe service interruption resulting in financial loss. It also imposes the threat of identity protection. Detecting intrusion on IoT devices in real-time is essential to make IoT-enabled services reliable, secure, and profitable. This paper presents a novel Deep Learning (DL)-based intrusion detection system for IoT devices. This intelligent system uses a four-layer deep Fully Connected (FC) network architecture to detect malicious traffic that may initiate attacks on connected IoT devices. The proposed system has been developed as a communication protocol-independent system to reduce deployment complexities. The proposed system demonstrates reliable performance for simulated and real intrusions during the experimental performance analysis. It detects the Blackhole, Distributed Denial of Service, Opportunistic Service, Sinkhole, and Workhole attacks with an average accuracy of 93.74%. The proposed intrusion detection system's precision, recall, and F1-score are 93.71%, 93.82%, and 93.47%, respectively, on average. This innovative deep learning-based IDS maintains a 93.21% average detection rate which is satisfactory for improving the security of IoT networks.
引用
收藏
页数:17
相关论文
共 55 条
[1]  
Abdel-Basset M., 2022, DEEP LEARNING TECHNI, V997
[2]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[3]  
Agarap A. F., 2018, ArXiv Preprint, DOI DOI 10.48550/ARXIV.1803.08375
[4]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[5]  
Alajanbi M., 2021, INT T ELECTR ENERGY, V2021, P4
[6]   DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT [J].
Alani, Mohammed M. ;
Damiani, Ernesto ;
Ghosh, Uttam .
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2022, :169-174
[7]   Detection of Obfuscated Malicious Java']JavaScript Code [J].
Alazab, Ammar ;
Khraisat, Ansam ;
Alazab, Moutaz ;
Singh, Sarabjot .
FUTURE INTERNET, 2022, 14 (08)
[8]   A new intrusion detection system based on Moth–Flame Optimizer algorithm [J].
Alazab M. ;
Khurma R.A. ;
Awajan A. ;
Camacho D. .
Expert Systems with Applications, 2022, 210
[9]  
Alazab M., 2015, NEW THREATS COUNTERM, P105
[10]  
Alazab M., 2014, Analysis on smartphone devices for detection and prevention of malware