Transfer Learning Approach to IDS on Cloud IoT Devices Using Optimized CNN

被引:55
作者
Okey, Ogobuchi Daniel [1 ]
Melgarejo, Dick Carrillo [2 ]
Saadi, Muhammad [3 ]
Rosa, Renata Lopes [4 ]
Kleinschmidt, Joao Henrique [5 ]
Rodriguez, Demostenes Zegarra [4 ]
机构
[1] Univ Fed Lavras, Grad Program Syst Engn & Automat Engn, BR-37203202 Lavras, MG, Brazil
[2] Lappeenranta Lahti Univ Technol, Sch Energy Syst, Lappeenranta 53850, Finland
[3] Univ Cent Punjab, Dept Elect Engn, Lahore 54000, Pakistan
[4] Univ Fed Lavras, Dept Comp Sci, BR-37203202 Lavras, MG, Brazil
[5] Fed Univ ABC, Ctr Engn Modeling & Appl Social Sci, BR-09210580 Santo Andre, SP, Brazil
关键词
Internet of Things; Cloud computing; Transfer learning; Convolutional neural networks; Security; Deep learning; Data models; convolutional neural network; cloud IoT; intrusion detection systems; transfer learning; MCC; INTRUSION-DETECTION; INTERNET; SYSTEMS; SCHEME; SMOTE;
D O I
10.1109/ACCESS.2022.3233775
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data centralization can potentially increase Internet of Things (IoT) usage. The trend is to move IoT devices to a centralized server with higher memory capacity and a more robust management interface. Hence, a larger volume of data will be transmitted, resulting in more network security issues. Cloud IoT offers more advantages for deploying and managing IoT systems through minimizing response delays, optimal latency, and effective network load distribution. As a result, sophisticated network attack strategies are deployed to leverage the vulnerabilities in the extensive network space and exploit user information. Several attempts have been made to provide network intrusion detection systems (IDS) to the cloud IoT interface using machine learning and deep learning approaches on dedicated IDS datasets. This paper proposes a transfer learning IDS based on the Convolutional Neural Network (CNN) architecture that has shown excellent results on image classification. We use five pre-trained CNN models, including VGG16, VGG19, Inception, MobileNet, and EfficientNets, to train on two selected datasets: CIC-IDS2017 and CSE-CICIDS2018. Before the training, we carry out preprocessing, imbalance treatment, dimensionality reduction, and conversion of the feature vector into images suitable for the CNN architecture using Quantile Transformer. Three best-performing models (InceptionV3, MobileNetV3Small, and EfficientNetV2B0) are selected to develop an ensemble model called efficient-lightweight ensemble transfer learning (ELETL-IDS) using the model averaging approach. On evaluation, the findings show that the ELETL-IDS outperformed existing state-of-the-art proposals in all evaluation metrics, reaching 100% in accuracy, precision, recall, and F-score. We use Matthew's Correlation Coefficient (MCC) to validate this result and compared it to the AUC-ROC, which maintained an exact value of 0.9996. To this end, our proposed model is lightweight, efficient, and reliable enough to be deployed in cloud IoT systems for intrusion detection.
引用
收藏
页码:1023 / 1038
页数:16
相关论文
共 65 条
[1]   Fog Computing and Smart Gateway Based Communication for Cloud of Things [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :464-470
[2]  
aws, A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018)-Registry of Open Data on AWS
[3]  
Bergstra J., 2013, INT C MACHINE LEARNI, P115
[4]   Integrating structured biological data by Kernel Maximum Mean Discrepancy [J].
Borgwardt, Karsten M. ;
Gretton, Arthur ;
Rasch, Malte J. ;
Kriegel, Hans-Peter ;
Schoelkopf, Bernhard ;
Smola, Alex J. .
BIOINFORMATICS, 2006, 22 (14) :E49-E57
[5]  
Buitinck L., 2013, ECML PKDD WORKSH LAN, P108
[6]  
Cambra C, 2017, IEEE ICC
[7]   A Survey on Intrusion Detection Systems for Fog and Cloud Computing [J].
Chang, Victor ;
Golightly, Lewis ;
Modesti, Paolo ;
Xu, Qianwen Ariel ;
Doan, Le Minh Thao ;
Hall, Karl ;
Boddu, Sreeja .
FUTURE INTERNET, 2022, 14 (03)
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]  
CICDataset, INDEX CICDATASET CI
[10]   Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection [J].
Das, Saikat ;
Saha, Sajal ;
Priyoti, Annita Tahsin ;
Roy, Etee Kawna ;
Sheldon, Frederick T. T. ;
Haque, Anwar ;
Shiva, Sajjan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04) :4821-4833