DL-Powered Anomaly Identification System for Enhanced IoT Data Security

被引:3
作者
Kolhar, Manjur [1 ]
Aldossary, Sultan Mesfer [1 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Wadi Ad Dawaser 11990, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 77卷 / 03期
关键词
security threats; LSTM; IDS; IoT; CNN; ACCESS-CONTROL; TRUST; REPUTATION; INTERNET; THINGS;
D O I
10.32604/cmc.2023.042726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many commercial and public sectors, the Internet of Things (IoT) is deeply embedded. Cyber security threats aimed at compromising the security, reliability, or accessibility of data are a serious concern for the IoT. Due to the collection of data from several IoT devices, the IoT presents unique challenges for detecting anomalous behavior. It is the responsibility of an Intrusion Detection System (IDS) to ensure the security of a network by reporting any suspicious activity. By identifying failed and successful attacks, IDS provides a more comprehensive security capability. A reliable and efficient anomaly detection system is essential for IoT-driven decision-making. Using deep learning-based anomaly detection, this study proposes an IoT anomaly detection system capable of identifying relevant characteristics in a controlled environment. These factors are used by the classifier to improve its ability to identify fraudulent IoT data. For efficient outlier detection, the author proposed a Convolutional Neural Network (CNN) with Long Short Term Memory (LSTM) based Attention Mechanism (ACNN-LSTM). As part of the ACNN-LSTM model, CNN units are deployed with an attention mechanism to avoid memory loss and gradient dispersion. Using the N-BaIoT and IoT-23 datasets, the model is verified. According to the N-BaIoT dataset, the overall accuracy is 99%, and precision, recall, and F1-score are also 0.99. In addition, the IoT-23 dataset shows a commendable accuracy of 99%. In terms of accuracy and recall, it scored 0.99, while the F1-score was 0.98. The LSTM model with attention achieved an accuracy of 95%, while the CNN model achieved an accuracy of 88%. According to the loss graph, attention-based models had lower loss values, indicating that they were more effective at detecting anomalies. In both the N-BaIoT and IoT-23 datasets, the receiver operating characteristic and area under the curve (ROC-AUC) graphs demonstrated exceptional accuracy of 99% to 100% for the Attention-based CNN and LSTM models. This indicates that these models are capable of making precise predictions.
引用
收藏
页码:2857 / 2879
页数:23
相关论文
共 34 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey [J].
Bellini, Emanuele ;
Iraqi, Youssef ;
Damiani, Ernesto .
IEEE ACCESS, 2020, 8 (08) :21127-21151
[3]  
Chen Y., 2023, IEEE Network, P1, DOI [10.1109/MNET127.2200414, DOI 10.1109/MNET127.2200414]
[4]   Blockchain-driven authorized data access mechanism for digital healthcare [J].
Chhikara, Deepak ;
Rana, Saurabh ;
Mishra, Ankita ;
Mishra, Dheerendra .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 131
[5]  
Chopra Kriti, 2019, 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), P135, DOI 10.1109/COMITCon.2019.8862269
[6]  
Downs D. D., 1985, Proceedings of the 1985 Symposium on Security and Privacy (Cat. No. 85CH2150-1), P208
[7]   Crowd review and attribute-based credit computation for an access control mechanism in cloud data centers [J].
Dubey A.K. ;
Mishra V. .
International Journal of Computers and Applications, 2023, 45 (02) :212-219
[8]  
Ferraiolo D. E., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P241
[9]   Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges [J].
Fortino, Giancarlo ;
Fotia, Lidia ;
Messina, Fabrizio ;
Rosaci, Domenico ;
Sarne, Giuseppe M. L. .
IEEE ACCESS, 2020, 8 :60117-60125
[10]   Token-Based Access Control [J].
Gan, Guohua ;
Chen, E. ;
Zhou, Zhiyuan ;
Zhu, Yan .
IEEE ACCESS, 2020, 8 (08) :54189-54199