AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

被引:143
作者
Li, Jiaqi [1 ]
Zhao, Zhifeng [1 ]
Li, Rongpeng [1 ]
Zhang, Honggang [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Artificial intelligence (AI); intrusion detection; network security; software defined Internet of Things (SD-IoT); 5G;
D O I
10.1109/JIOT.2018.2883344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined Internet of Things (SD-IoT) networks profit from centralized management and interactive resource sharing, which enhances the efficiency and scalability of Internet of Things applications. But with the rapid growth in services and applications, they are vulnerable to possible attacks and face severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection methods are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intelligently, which makes it hard to satisfy the requirements of SD-IoT networks. In this paper, we propose an artificial intelligence-based two-stage intrusion detection empowered by software defined technology. It flexibly captures network flows with a global view and detects attacks intelligently. We first leverage Bat algorithm with swarm division and binary differential mutation to select typical features. Then, we exploit Random Forest through adaptively altering the weights of samples using the weighted voting mechanism to classify flows. Evaluation results prove that the modified intelligent algorithms select more important features and achieve superior performance in flow classification. It is also verified that our solution shows better accuracy with lower overhead compared with existing solutions.
引用
收藏
页码:2093 / 2102
页数:10
相关论文
共 30 条
  • [11] Haq Nutan Farah, 2015, International Journal of Advanced Research in Artificial Intelligence, V4, P9
  • [12] KAKIZ MT, 2017, INT ART INT DAT PROC, P1
  • [13] An efficient k-means clustering algorithm:: Analysis and implementation
    Kanungo, T
    Mount, DM
    Netanyahu, NS
    Piatko, CD
    Silverman, R
    Wu, AY
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (07) : 881 - 892
  • [14] Improving Network Management with Software Defined Networking
    Kim, Hyojoon
    Feamster, Nick
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 114 - 119
  • [15] Clinical Nomograms to Predict Stone-Free Rates after Shock-Wave Lithotripsy: Development and Internal-Validation
    Kim, Jung Kwon
    Ha, Seung Beom
    Jeon, Chan Hoo
    Oh, Jong Jin
    Cho, Sung Yong
    Oh, Seung-June
    Kim, Hyeon Hoe
    Jeong, Chang Wook
    [J]. PLOS ONE, 2016, 11 (02):
  • [16] Machine learning-based IDS for software-defined 5G network
    Li, Jiaqi
    Zhao, Zhifeng
    Li, Rongpeng
    [J]. IET NETWORKS, 2018, 7 (02) : 53 - 60
  • [17] INTELLIGENT 5G: WHEN CELLULAR NETWORKS MEET ARTIFICIAL INTELLIGENCE
    Li, Rongpeng
    Zhao, Zhifeng
    Zhou, Xuan
    Ding, Guoru
    Chen, Yan
    Wang, Zhongyao
    Zhang, Honggang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (05) : 175 - 183
  • [18] Machine learning for internet of things data analysis: a survey
    Mahdavinejad, Mohammad Saeid
    Rezvan, Mohammadreza
    Barekatain, Mohammadamin
    Adibi, Peyman
    Barnaghi, Payam
    Sheth, Amit P.
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (03) : 161 - 175
  • [19] Mehmood T, 2015, 2015 INTERNATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES AND COMPUTING RESEARCH (ISMSC), P121, DOI 10.1109/ISMSC.2015.7594039
  • [20] A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow
    Nobakht, Mehdi
    Sivaraman, Vijay
    Boreli, Roksana
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 147 - 156