Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks

被引:2
作者
Zakariyya, Idris [1 ]
Kalutarage, Harsha [1 ]
Al-Kadri, M. Omar [2 ]
机构
[1] Robert Gordon Univ, Sch Comp, Aberdeen, Scotland
[2] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham, W Midlands, England
来源
CPSS'22: PROCEEDINGS OF THE 8TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP | 2022年
关键词
IoT; Intrusion detection; Deep neural network; Computational efficient; IDS;
D O I
10.1145/3494107.3522772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our everyday lives, making them a lucrative target for attackers. These devices require suitable security mechanisms that enable robust and effective detection of attacks. Deep Neural Networks (DNNs) offer a promise, but they require large amounts of computational resources to provide better detection, and their detection capabilities can be exploited by adversarial attacks. Therefore, this paper proposes a method to train Fully Connected Neural Network (FCNN) for IoT security monitoring in a robust, effective and resource-efficient way. The resulting model is assessed against various benchmark datasets created using commercial IoT devices, such as doorbells, security cameras, and thermostats. Experimental results demonstrate the model's ability to maintain state-of-the-art accuracy and F1-score while reducing training memory and time consumption by 99.99 and 99.80 percentage points than its benchmark counterpart.
引用
收藏
页码:41 / 51
页数:11
相关论文
共 46 条
[1]   State-of-the-art in artificial neural network applications: A survey [J].
Abiodun, Oludare Isaac ;
Jantan, Aman ;
Omolara, Abiodun Esther ;
Dada, Kemi Victoria ;
Mohamed, Nachaat AbdElatif ;
Arshad, Humaira .
HELIYON, 2018, 4 (11)
[2]  
Aggarwal CC., 2018, Neural networks and deep learning, DOI DOI 10.1007/978-3-319-94463-0
[3]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[4]  
Athalye A, 2018, PR MACH LEARN RES, V80
[5]  
Bhunia SS, 2017, 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P84
[6]  
Biggio Battista, 2014, P 2014 WORKSH ART IN, P27, DOI DOI 10.1145/2666652.2666666
[7]   Fitness Landscape Analysis of Weight-Elimination Neural Networks [J].
Bosman, Anna ;
Engelbrecht, Andries ;
Helbig, Marde .
NEURAL PROCESSING LETTERS, 2018, 48 (01) :353-373
[8]  
Chauvin Y., 2013, Backpropagation: Theory, Architectures, and Applications, DOI DOI 10.4324/9780203763247
[9]  
Dong Bowei, 2021, TECHNOLOGY EVOLUTION, V79, DOI [10.1016/j.NanoEnergynanoen.2020.105414, DOI 10.1016/J.NANOENERGYNANOEN.2020.105414]
[10]   Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things [J].
Dunn, Corey ;
Moustafa, Nour ;
Turnbull, Benjamin .
SUSTAINABILITY, 2020, 12 (16)