LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT

被引:79
作者
Han, Dezhi [1 ]
Zhou, Hongxu [1 ]
Weng, Tien-Hsiung [3 ]
Wu, Zhongdai [2 ]
Han, Bing [2 ]
Li, Kuan-Ching [3 ]
Pathan, Al-Sakib Khan [4 ]
机构
[1] Shanghai Maritime Univ, Dept Engn, Shanghai, Peoples R China
[2] Shanghai Ship & Shipping Res Inst Co Ltd, Shanghai, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[4] United Int Univ UIU, Dept Comp Sci & Engn, Dhaka, Bangladesh
基金
中国国家自然科学基金;
关键词
Anomaly network traffic detection; Coordinate attention mechanism; Deep learning; IoT; MobileNet model; SYSTEM;
D O I
10.1007/s11235-023-01059-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As widely known, most of the Internet of Things (IoT) devices own small storage and constrained computing power, and hence, their poor security evaluation capabilities make them vulnerable to several types of network attacks. Given this setting, anomaly network traffic detection techniques based on deep learning (DL) offer some practical solutions, and they have brought new opportunities to the security of the IoT. However, existing DL models for anomaly network traffic detection need better flexibility and classification accuracy. Also, the scale of those models needs to be optimized, as a sheer majority of them need to be more suitable for deployment on terminal devices of IoT. Therefore, we propose an anomaly network traffic detection model in this work LMCA, standing for Lightweight Model Integrating adjusted MobileNet and Coordinate Attention mechanism. Combining the adjusted MobileNet model and the coordinate attention mechanism, it constructs a lightweight anomaly network traffic detection model and effectively extracts traffic data's local, global, and spatial-temporal features, which would be easy to deploy on IoT terminals. LMCA has a small scale and good performance, making it suitable for IoT environments. Moreover, we use an original traffic feature extraction method to reduce redundant features and speed up neural network convergence. This work also solves a problem so that the original MobileNet model could perform better on a small dataset, extending the anomaly traffic detection for IoT. To simulate the IoT environment, we used the wired network dataset CICDS2017 and the wireless network dataset AWID. Experimental results demonstrate that the proposed work outperforms other existing methods, the accuracy reached 99.96% on the CICIDS2017 dataset and 99.98% on the AWID dataset.
引用
收藏
页码:549 / 564
页数:16
相关论文
共 35 条
[1]   An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning [J].
Abu Alghanam, Orieb ;
Almobaideen, Wesam ;
Saadeh, Maha ;
Adwan, Omar .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[2]   Classification model for accuracy and intrusion detection using machine learning approach [J].
Agarwal, Arushi ;
Sharma, Purushottam ;
Alshehri, Mohammed ;
Mohamed, Ahmed A. ;
Alfarraj, Osama .
PEERJ COMPUTER SCIENCE, 2021,
[3]   A survey on IoT platforms: Communication, security, and privacy perspectives [J].
Babun, Leonardo ;
Denney, Kyle ;
Celik, Z. Berkay ;
McDaniel, Patrick ;
Uluagac, A. Selcuk .
COMPUTER NETWORKS, 2021, 192
[4]   DFE: efficient IoT network intrusion detection using deep feature extraction [J].
Basati, Amir ;
Faghih, Mohammad Mehdi .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (18) :15175-15195
[5]   K maximum probability attack paths generation algorithm for target nodes in networked systems [J].
Bi, Kun ;
Han, Dezhi ;
Zhang, Guichen ;
Li, Kuan-Ching ;
Castiglione, Aniello .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (04) :535-551
[6]   CAAN: Context-Aware attention network for visual question answering [J].
Chen, Chongqing ;
Han, Dezhi ;
Chang, Chin -Chen .
PATTERN RECOGNITION, 2022, 132
[7]   Semisupervised Feature Selection via Structured Manifold Learning [J].
Chen, Xiaojun ;
Chen, Renjie ;
Wu, Qingyao ;
Nie, Feiping ;
Yang, Min ;
Mao, Rui .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (07) :5756-5766
[8]   ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks [J].
Cui, Mingming ;
Han, Dezhi ;
Wang, Jun ;
Li, Kuan-Ching ;
Chang, Chin-Chen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15815-15827
[9]   A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection [J].
Han, Dezhi ;
Pan, Nannan ;
Li, Kuan-Ching .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :316-327
[10]   On one-time cookies protocol based on one-time password [J].
He, Junhui ;
Han, Dezhi ;
Li, Kuan-Ching .
SOFT COMPUTING, 2020, 24 (08) :5657-5670