Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID

被引:23
作者
Abosata, Nasr [1 ]
Al-Rubaye, Saba [1 ]
Inalhan, Gokhan [1 ]
机构
[1] Cranfield Univ, Sch Aerosp, Transport & Mfg, Cranfield MK43 0AL, England
关键词
Internet of Things (IoT); security; distributed sensors; intrusion detection; machine learning; application; AMI; attacks;
D O I
10.3390/s23010321
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (RPL), which is applied in various heterogeneous IoT applications. Hence, the increase in reliance on the IoT requires focus on the security of the RPL protocol. The top defence layer is an intrusion detection system (IDS), and the heterogeneous characteristics of the IoT and variety of novel intrusions make the design of the RPL IDS significantly complex. Most existing IDS solutions are unified models and cannot detect novel RPL intrusions. Therefore, the RPL requires a customised global attack knowledge-based IDS model to identify both existing and novel intrusions in order to enhance its security. Federated transfer learning (FTL) is a trending topic that paves the way to designing a customised RPL-IoT IDS security model in a heterogeneous IoT environment. In this paper, we propose a federated-transfer-learning-assisted customised distributed IDS (FT-CID) model to detect RPL intrusion in a heterogeneous IoT. The design process of FT-CID includes three steps: dataset collection, FTL-assisted edge IDS learning, and intrusion detection. Initially, the central server initialises the FT-CID with a predefined learning model and observes the unique features of different RPL-IoTs to construct a local model. The experimental model generates an RPL-IIoT dataset with normal and abnormal traffic through simulation on the Contiki-NG OS. Secondly, the edge IDSs are trained using the local parameters and the globally shared parameters generated by the central server through federation and aggregation of different local parameters of various edges. Hence, transfer learning is exploited to update the server's and edges' local and global parameters based on relational knowledge. It also builds and customised IDS model with partial retraining through local learning based on globally shared server knowledge. Finally, the customised IDS in the FT-CID model enforces the detection of intrusions in heterogeneous IoT networks. Moreover, the FT-CID model accomplishes high RPL security by implicitly utilising the local and global parameters of different IoTs with the assistance of FTL. The FT-CID detects RPL intrusions with an accuracy of 85.52% in tests on a heterogeneous IoT network.
引用
收藏
页数:20
相关论文
共 36 条
[1]  
Agiollo A., 2021, IEEE T NETW SERV MAN, V18, P1178, DOI DOI 10.1109/TNSM.2021.3075496
[2]   Real time dataset generation framework for intrusion detection systems in IoT [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :414-423
[3]   Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT [J].
Arumugam, K. ;
Srimathi, J. ;
Maurya, Sudhanshu ;
Joseph, Senoj ;
Asokan, Anju ;
Poongodi, M. ;
Algethami, Abdullah A. ;
Hamdi, Mounir ;
Rauf, Hafiz Tayyab .
SENSORS, 2021, 21 (23)
[4]   An Ensemble Multi-View Federated Learning Intrusion Detection for IoT [J].
Attota, Dinesh Chowdary ;
Mothukuri, Viraaji ;
Parizi, Reza M. ;
Pouriyeh, Seyedamin .
IEEE ACCESS, 2021, 9 :117734-117745
[5]   Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off [J].
Chakraborty, Saurav ;
Onuchowska, Agnieszka ;
Samtani, Sagar ;
Jank, Wolfgang ;
Wolfram, Brandon .
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (04)
[6]   Intrusion Detection for Wireless Edge Networks Based on Federated Learning [J].
Chen, Zhuo ;
Lv, Na ;
Liu, Pengfei ;
Fang, Yu ;
Chen, Kun ;
Pan, Wu .
IEEE ACCESS, 2020, 8 :217463-217472
[7]   Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures [J].
Cui, Lei ;
Qu, Youyang ;
Xie, Gang ;
Zeng, Deze ;
Li, Ruidong ;
Shen, Shigen ;
Yu, Shui .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3492-3500
[8]   Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset [J].
Foley, John ;
Moradpoor, Naghmeh ;
Ochenyi, Henry .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[9]   Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems [J].
Guan, Jianfeng ;
Cai, Junxian ;
Bai, Haozhe ;
You, Ilsun .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (11) :3351-3365
[10]   A Survey on Federated Learning for Resource-Constrained IoT Devices [J].
Imteaj, Ahmed ;
Thakker, Urmish ;
Wang, Shiqiang ;
Li, Jian ;
Amini, M. Hadi .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :1-24