AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

被引:152
作者
Li, Jiaqi [1 ]
Zhao, Zhifeng [1 ]
Li, Rongpeng [1 ]
Zhang, Honggang [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Artificial intelligence (AI); intrusion detection; network security; software defined Internet of Things (SD-IoT); 5G;
D O I
10.1109/JIOT.2018.2883344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined Internet of Things (SD-IoT) networks profit from centralized management and interactive resource sharing, which enhances the efficiency and scalability of Internet of Things applications. But with the rapid growth in services and applications, they are vulnerable to possible attacks and face severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection methods are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intelligently, which makes it hard to satisfy the requirements of SD-IoT networks. In this paper, we propose an artificial intelligence-based two-stage intrusion detection empowered by software defined technology. It flexibly captures network flows with a global view and detects attacks intelligently. We first leverage Bat algorithm with swarm division and binary differential mutation to select typical features. Then, we exploit Random Forest through adaptively altering the weights of samples using the weighted voting mechanism to classify flows. Evaluation results prove that the modified intelligent algorithms select more important features and achieve superior performance in flow classification. It is also verified that our solution shows better accuracy with lower overhead compared with existing solutions.
引用
收藏
页码:2093 / 2102
页数:10
相关论文
共 30 条
[11]  
Haq Nutan Farah, 2015, International Journal of Advanced Research in Artificial Intelligence, V4, P9
[12]  
KAKIZ MT, 2017, INT ART INT DAT PROC, P1
[13]   An efficient k-means clustering algorithm:: Analysis and implementation [J].
Kanungo, T ;
Mount, DM ;
Netanyahu, NS ;
Piatko, CD ;
Silverman, R ;
Wu, AY .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (07) :881-892
[14]   Improving Network Management with Software Defined Networking [J].
Kim, Hyojoon ;
Feamster, Nick .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) :114-119
[15]   Clinical Nomograms to Predict Stone-Free Rates after Shock-Wave Lithotripsy: Development and Internal-Validation [J].
Kim, Jung Kwon ;
Ha, Seung Beom ;
Jeon, Chan Hoo ;
Oh, Jong Jin ;
Cho, Sung Yong ;
Oh, Seung-June ;
Kim, Hyeon Hoe ;
Jeong, Chang Wook .
PLOS ONE, 2016, 11 (02)
[16]   Machine learning-based IDS for software-defined 5G network [J].
Li, Jiaqi ;
Zhao, Zhifeng ;
Li, Rongpeng .
IET NETWORKS, 2018, 7 (02) :53-60
[17]   INTELLIGENT 5G: WHEN CELLULAR NETWORKS MEET ARTIFICIAL INTELLIGENCE [J].
Li, Rongpeng ;
Zhao, Zhifeng ;
Zhou, Xuan ;
Ding, Guoru ;
Chen, Yan ;
Wang, Zhongyao ;
Zhang, Honggang .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (05) :175-183
[18]   Machine learning for internet of things data analysis: a survey [J].
Mahdavinejad, Mohammad Saeid ;
Rezvan, Mohammadreza ;
Barekatain, Mohammadamin ;
Adibi, Peyman ;
Barnaghi, Payam ;
Sheth, Amit P. .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (03) :161-175
[19]  
Mehmood T, 2015, 2015 INTERNATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES AND COMPUTING RESEARCH (ISMSC), P121, DOI 10.1109/ISMSC.2015.7594039
[20]   A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow [J].
Nobakht, Mehdi ;
Sivaraman, Vijay ;
Boreli, Roksana .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :147-156