HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN

被引:22
作者
Li, Sifan [1 ]
Cao, Yue [1 ]
Liu, Shuohan [2 ]
Lai, Yuping [3 ]
Zhu, Yongdong [4 ]
Ahmad, Naveed [5 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Univ Warwick, Warwick Mfg Grp, Coventry CV4 7AL, England
[3] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[4] Zhejiang Lab, Inst Intelligent Syst, Hangzhou 311000, Peoples R China
[5] Prince Sultan Univ, Dept Comp Sci, Riyadh 11586, Saudi Arabia
关键词
Internet of Things; Intrusion Detection System; Machine learning; Generative adversarial network; DEEP LEARNING APPROACH; NEURAL-NETWORKS; OPTIMIZATION; STACKING; INTERNET;
D O I
10.1016/j.eswa.2023.122198
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the application of the internet of things (IoT) in areas such as intelligent transportation, smart cities, and the industrial internet has become increasingly widespread. As a crucial supporting infrastructure, IoT devices are utilized in various fields to construct IoT networks. However, due to the inherent limitations of IoT devices, such as limited computing resources and low memory capacity, security concerns have become increasingly prominent. Among these concerns are Denial-of-Service (DoS) and botnet attacks, which are difficult to prevent due to their large-scale and covert nature. To address these challenges, this paper proposes a Hybrid DoS Attack Intrusion Detection System (HDA-IDS) that combines signature-based detection with anomaly-based detection to effectively identify both known and unknown DoS/botnet attacks. Additionally, this paper introduces a novel anomaly-based detection model called CL-GAN. It integrates CNN-LSTM with GAN to establish a baseline for normal behavior and detect malicious traffic. In contrast to other semi-supervised models, the CL-GAN exhibits superior accuracy, as well as shorter training and testing times, in detecting DoS and botnet attacks. In addition, experimental results demonstrate that the HDA-IDS outperforms other IDSs in detecting DoS and botnet attacks. When tested on datasets such as NSL-KDD, CICIDS2018, and Bot-IoT, the HDA-IDS achieved an average of 5% overall improvement superior performance in terms of accuracy, precision, recall, and F1-Score compared to other works. These results highlight the effectiveness of the proposed system in addressing security issues in IoT networks, and presents a general framework that addresses the challenge of large-scale attacks constructed through the dissemination of false information.
引用
收藏
页数:16
相关论文
共 54 条
  • [1] Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks
    Abdel-Basset, Mohamed
    Hawash, Hossam
    Chakrabortty, Ripon K.
    Ryan, Michael J.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 12251 - 12265
  • [2] On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things
    Abdelmoumin, Ghada
    Rawat, Danda B.
    Rahman, Abdul
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4280 - 4290
  • [3] Alaba A., 2019, International Journal of Computer Science and Information Security (IJCSIS), V17
  • [4] Distributed Deep CNN-LSTM Model for Intrusion Detection Method in IoT-Based Vehicles
    Alferaidi, Ali
    Yadav, Kusum
    Alharbi, Yasser
    Razmjooy, Navid
    Viriyasitavat, Wattana
    Gulati, Kamal
    Kautish, Sandeep
    Dhiman, Gaurav
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [5] IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities
    Ashraf, Javed
    Keshk, Marwa
    Moustafa, Nour
    Abdel-Basset, Mohamed
    Khurshid, Hasnat
    Bakhshi, Asim D.
    Mostafa, Reham R.
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 72
  • [6] Comparative analysis of machine learning algorithms for identification of BOT attack on the Internet of Vehicles (IoV)
    Aswal, Kiran
    Dobhal, Dinesh C.
    Pathak, Heman
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 312 - 317
  • [7] A hybrid intrusion detection system design for computer network security
    Aydin, M. Ali
    Zaim, A. Halim
    Ceylan, K. Goekhan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 517 - 526
  • [8] Chauhan R., 2020, P 2020 INT S NETW CO, P1, DOI [DOI 10.1109/ISNCC49221.2020.9297264, 10.1109/ISNCC49221.2020.9297264]
  • [9] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [10] An implementation of bi-phase network intrusion detection system by using real-time traffic analysis
    Chowdhury, Ratul
    Sen, Shibaprasad
    Goswami, Arpan
    Purkait, Shankhadeep
    Saha, Banani
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2023, 224