A deep learning approach for intrusion detection in Internet of Things using focal loss function

被引:69
作者
Dina, Ayesha S. [1 ]
Siddique, A. B. [1 ]
Manivannan, D. [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40508 USA
关键词
Internet of Things; Intrusion detection; Cyber security; Data imbalance problem; Loss functions; Deep learning; INDUSTRIAL INTERNET; DETECTION SYSTEM; TRUST EVALUATION; MACHINE; FRAMEWORK; NETWORKS;
D O I
10.1016/j.iot.2023.100699
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is likely to revolutionize healthcare, energy, education, transporta-tion, manufacturing, military, agriculture, and other industries. However, for the successful deployment of IoT in various industries, methods for detecting and preventing security breaches need to be designed and implemented. Over the past decade, a number of researchers in academia and industry have used Machine Learning (ML) techniques to design and implement Intrusion Detection Systems (IDSes) for computer networks in general; however, not much work has been done for intrusion detection in IoT. Datasets collected by various organizations were used by many of these researchers to train ML models for predicting intrusions. It is common for datasets used in such systems to be imbalanced (i.e., not all classes have equal number of samples). Predictive models developed using machine learning algorithms can produce unsatisfactory results if imbalanced datasets are used for training the models. To remedy this problem, techniques such as random oversampling and undersampling do not produce robust models. Furthermore, ML models trained using traditional loss functions, such as cross-entropy loss, fail to accurately predict minority class instances. To overcome the data imbalance problem for intrusion detection in IoT, we leverage the specialized loss function, called focal loss, that automatically down-weighs easy examples and focuses on the hard negatives by facilitating dynamically scaled-gradient updates for training effective ML models. We implemented our approach using two well-known Deep Learning (DL) neural network architectures. We conducted extensive experimental evaluations using three datasets from diverse IoT domains and compared our proposed approach with state-of-the-art intrusion detection models. We found that, our approach (training DL models using focal loss function) performed better with respect to accuracy, precision, F1 score and MCC score by as much as 24%, 39%, 39%, and 60%, respectively, compared to training them on the same datasets using cross-entropy loss function. We also compare our approach with two other state-of-the-art approaches and show that our approach performs better than these state-of-the-art approaches.
引用
收藏
页数:16
相关论文
共 82 条
[1]   A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT [J].
Aboelwafa, Mariam M. N. ;
Seddik, Karim G. ;
Eldefrawy, Mohamed H. ;
Gadallah, Yasser ;
Gidlund, Mikael .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :8462-8471
[2]   Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers [J].
Alves, Thiago ;
Das, Rishabh ;
Morris, Thomas .
IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) :99-102
[3]   A Machine Learning Based Intrusion Detection System for Mobile Internet of Things [J].
Amouri, Amar ;
Alaparthy, Vishwa T. ;
Morgera, Salvatore D. .
SENSORS, 2020, 20 (02)
[4]  
[Anonymous], CODE LINK CNN BILSTM
[5]  
[Anonymous], CODE LINK PB DID REP
[6]   A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems [J].
Arachchige, Pathum Chamikara Mahawaga ;
Bertok, Peter ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Camtepe, Seyit ;
Atiquzzaman, Mohammed .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6092-6102
[7]  
Arulmurugan R, 2018, L N COMPUT VIS BIOME, V28, P103, DOI 10.1007/978-3-319-71767-8_9
[8]   A Machine Learning Security Framework for Iot Systems [J].
Bagaa, Miloud ;
Taleb, Tarik ;
Bernabe, Jorge Bernal ;
Skarmeta, Antonio .
IEEE ACCESS, 2020, 8 :114066-114077
[9]   An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J].
Beaver, Justin M. ;
Borges-Hink, Raymond C. ;
Buckner, Mark. A. .
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, :54-59
[10]   How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey [J].
Bout, Emilie ;
Loscri, Valeria ;
Gallais, Antoine .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) :248-279