A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

被引:89
作者
Awajan, Albara [1 ]
机构
[1] Al Balqa Appl Univ, Fac Artificial Intelligence, Dept Intelligent Syst, Al Salt 19117, Jordan
关键词
intrusion detection system (IDS); Internet of Things (IoT); deep learning (DL); machine learning; communication protocol; FC network; MALWARE;
D O I
10.3390/computers12020034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim. Attacks on IoT, if they remain undetected for an extended period, cause severe service interruption resulting in financial loss. It also imposes the threat of identity protection. Detecting intrusion on IoT devices in real-time is essential to make IoT-enabled services reliable, secure, and profitable. This paper presents a novel Deep Learning (DL)-based intrusion detection system for IoT devices. This intelligent system uses a four-layer deep Fully Connected (FC) network architecture to detect malicious traffic that may initiate attacks on connected IoT devices. The proposed system has been developed as a communication protocol-independent system to reduce deployment complexities. The proposed system demonstrates reliable performance for simulated and real intrusions during the experimental performance analysis. It detects the Blackhole, Distributed Denial of Service, Opportunistic Service, Sinkhole, and Workhole attacks with an average accuracy of 93.74%. The proposed intrusion detection system's precision, recall, and F1-score are 93.71%, 93.82%, and 93.47%, respectively, on average. This innovative deep learning-based IDS maintains a 93.21% average detection rate which is satisfactory for improving the security of IoT networks.
引用
收藏
页数:17
相关论文
共 55 条
[21]   LungNet: A hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data [J].
Faruqui, Nuruzzaman ;
Abu Yousuf, Mohammad ;
Whaiduzzaman, Md ;
Azad, A. K. M. ;
Barros, Alistair ;
Moni, Mohammad Ali .
COMPUTERS IN BIOLOGY AND MEDICINE, 2021, 139
[22]   Opportunistic Fog for IoT: Challenges and Opportunities [J].
Fernando, Niroshinie ;
Loke, Seng W. ;
Avazpour, Iman ;
Chen, Fei-Fei ;
Abkenar, Amin B. ;
Ibrahim, Amani .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8897-8910
[23]  
Gao M, 2021, CHINA COMMUN, V18, P43, DOI 10.23919/JCC.2021.01.004
[24]  
Goyal M., 2018, P 2018 INT C CIRCUIT, P1
[25]  
Gupta V., 2012, P OPERATING SYSTEMS
[26]  
Han J, 1995, LECT NOTES COMPUT SC, V930, P195
[27]   Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks [J].
Harada, Rintaro ;
Shibata, Naotaka ;
Kaneko, Shin ;
Honda, Kazuaki ;
Terada, Jun ;
Ishida, Yota ;
Akashi, Kunio ;
Miyachi, Toshiyuki .
IEEE ACCESS, 2022, 10 :22392-22399
[28]   Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0 [J].
Hasan, Mohammad Kamrul ;
Akhtaruzzaman, Md ;
Kabir, S. Rayhan ;
Gadekallu, Thippa Reddy ;
Islam, Shayla ;
Magalingam, Pritheega ;
Hassan, Rosilah ;
Alazab, Mamoun ;
Alazab, Moutaz A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) :9153-9161
[29]  
Hilton S., 2016, Dyn Blog
[30]   A Realistic, Flexible and Extendible Network Emulation Platform for Space Networks [J].
Hou, Dongxu ;
Zhao, Kanglian ;
Li, Wenfeng ;
Du, Sidan .
ELECTRONICS, 2022, 11 (08)