AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

被引:143
作者
Li, Jiaqi [1 ]
Zhao, Zhifeng [1 ]
Li, Rongpeng [1 ]
Zhang, Honggang [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Artificial intelligence (AI); intrusion detection; network security; software defined Internet of Things (SD-IoT); 5G;
D O I
10.1109/JIOT.2018.2883344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined Internet of Things (SD-IoT) networks profit from centralized management and interactive resource sharing, which enhances the efficiency and scalability of Internet of Things applications. But with the rapid growth in services and applications, they are vulnerable to possible attacks and face severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection methods are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intelligently, which makes it hard to satisfy the requirements of SD-IoT networks. In this paper, we propose an artificial intelligence-based two-stage intrusion detection empowered by software defined technology. It flexibly captures network flows with a global view and detects attacks intelligently. We first leverage Bat algorithm with swarm division and binary differential mutation to select typical features. Then, we exploit Random Forest through adaptively altering the weights of samples using the weighted voting mechanism to classify flows. Evaluation results prove that the modified intelligent algorithms select more important features and achieve superior performance in flow classification. It is also verified that our solution shows better accuracy with lower overhead compared with existing solutions.
引用
收藏
页码:2093 / 2102
页数:10
相关论文
共 30 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks
    An Le
    Phuong Dinh
    Hoa Le
    Ngoc Cuong Tran
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 106 - 111
  • [3] [Anonymous], P 2016 INT C WIR NET
  • [4] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [5] Flow Based Security for IoT Devices using an SDN Gateway
    Bull, Peter
    Austin, Ron
    Popov, Evgenii
    Sharma, Mak
    Watson, Richard
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 159 - 165
  • [6] Cleetus N, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P387, DOI 10.1109/ICACCI.2014.6968613
  • [7] da Silva AS, 2016, IEEE IFIP NETW OPER, P27, DOI 10.1109/NOMS.2016.7502793
  • [8] An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection
    Enache, Adriana-Cristina
    Sgarciu, Valentin
    [J]. INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 41 - 51
  • [9] Enache AC, 2015, 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P11, DOI 10.1109/TSP.2015.7296215
  • [10] Anomaly Intrusions Detection Based On Support Vector Machines with an Improved Bat Algorithm
    Enache, Adriana-Cristina
    Sgarciu, Valentin
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 317 - 321