AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

被引:152
作者
Li, Jiaqi [1 ]
Zhao, Zhifeng [1 ]
Li, Rongpeng [1 ]
Zhang, Honggang [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Artificial intelligence (AI); intrusion detection; network security; software defined Internet of Things (SD-IoT); 5G;
D O I
10.1109/JIOT.2018.2883344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined Internet of Things (SD-IoT) networks profit from centralized management and interactive resource sharing, which enhances the efficiency and scalability of Internet of Things applications. But with the rapid growth in services and applications, they are vulnerable to possible attacks and face severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection methods are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intelligently, which makes it hard to satisfy the requirements of SD-IoT networks. In this paper, we propose an artificial intelligence-based two-stage intrusion detection empowered by software defined technology. It flexibly captures network flows with a global view and detects attacks intelligently. We first leverage Bat algorithm with swarm division and binary differential mutation to select typical features. Then, we exploit Random Forest through adaptively altering the weights of samples using the weighted voting mechanism to classify flows. Evaluation results prove that the modified intelligent algorithms select more important features and achieve superior performance in flow classification. It is also verified that our solution shows better accuracy with lower overhead compared with existing solutions.
引用
收藏
页码:2093 / 2102
页数:10
相关论文
共 30 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks [J].
An Le ;
Phuong Dinh ;
Hoa Le ;
Ngoc Cuong Tran .
2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, :106-111
[3]  
[Anonymous], P 2016 INT C WIR NET
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]   Flow Based Security for IoT Devices using an SDN Gateway [J].
Bull, Peter ;
Austin, Ron ;
Popov, Evgenii ;
Sharma, Mak ;
Watson, Richard .
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, :159-165
[6]  
Cleetus N, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P387, DOI 10.1109/ICACCI.2014.6968613
[7]  
da Silva AS, 2016, IEEE IFIP NETW OPER, P27, DOI 10.1109/NOMS.2016.7502793
[8]   An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection [J].
Enache, Adriana-Cristina ;
Sgarciu, Valentin .
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 :41-51
[9]  
Enache AC, 2015, 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P11, DOI 10.1109/TSP.2015.7296215
[10]   Anomaly Intrusions Detection Based On Support Vector Machines with an Improved Bat Algorithm [J].
Enache, Adriana-Cristina ;
Sgarciu, Valentin .
2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, :317-321