Improved Resnet Model Based on Positive Traffic Flow for IoT Anomalous Traffic Detection

被引:2
作者
Li, Qingfeng [1 ]
Liu, Yaqiu [2 ]
Niu, Tong [2 ]
Wang, Xiaoming [1 ]
机构
[1] Northeast Forestry Univ, Network Informat Ctr, Harbin 150040, Peoples R China
[2] Northeast Forestry Univ, Coll Comp & Control Engn, Harbin 150040, Peoples R China
关键词
deep learning; anomalous traffic detection; IoT; feature engineering; NEURAL-NETWORKS; INTERNET;
D O I
10.3390/electronics12183830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been highly appreciated by several nations and societies as a worldwide strategic developing sector. However, IoT security is seriously threatened by anomalous traffic in the IoT. Therefore, creating a detection model that can recognize such aberrant traffic is essential to ensuring the overall security of the IoT. We outline the main approaches that are used today to detect anomalous network traffic and suggest a Resnet detection model based on fused one-dimensional convolution (Conv1D) for this purpose. Our method combines one-dimensional convolution and a Resnet network to create a new network model. This network model improves the residual block by including Conv1D and Conv2D layers for two-dimensional convolution. This change enhances the model's ability to identify aberrant traffic by enabling the network to extract feature information from one-dimensional linearity and two-dimensional space. The CIC IoT Dataset from the Canadian Institute for Cybersecurity Research was used to assess the effectiveness of the proposed enhanced residual network technique. The outcomes demonstrate that the algorithm performs better at identifying aberrant traffic in the IoT than the original residual neural network. The accuracy achieved can be as high as 99.9%.
引用
收藏
页数:17
相关论文
共 40 条
[1]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[2]  
Ageev S, 2015, 2015 XVIII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), P5, DOI 10.1109/SCM.2015.7190394
[3]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[4]   An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering [J].
Alsulami, Abdulaziz A. ;
Abu Al-Haija, Qasem ;
Tayeb, Ahmad ;
Alqahtani, Ali .
APPLIED SCIENCES-BASEL, 2022, 12 (23)
[5]  
[常亮 Chang Liang], 2016, [自动化学报, Acta Automatica Sinica], V42, P1300
[6]  
Chen ZY, 2016, IEEE TRUST, P301, DOI [10.1109/TrustCom.2016.76, 10.1109/TrustCom.2016.0077]
[7]  
Dadkhah S., 2022, P 2022 19 ANN INT C, P1
[8]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[9]  
Harris G., 2020, Pcap capture file format
[10]   Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, :1026-1034