Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network

被引:199
作者
Zhang, Ying [1 ]
Li, Peisong [1 ]
Wang, Xinheng [2 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Univ West London, Sch Comp & Engn, London W5 5RF, England
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Internet of Things security; intrusion detection; deep belief network; genetic algorithm; LEARNING APPROACH; NEURAL-NETWORKS; INTERNET; THINGS; SECURITY;
D O I
10.1109/ACCESS.2019.2903723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the Internet of Things (IoT), the security of the network layer in the IoT is getting more and more attention. The traditional intrusion detection technologies cannot be well adapted in the complex Internet environment of IoT. For the deep learning algorithm of intrusion detection, a neural network structure may have fine detection accuracy for one kind of attack, but it may not have a good detection effect when facing other attacks. Therefore, it is urgent to design a self-adaptive model to change the network structure for different attack types. This paper presents an intrusion detection model based on improved genetic algorithm (GA) and deep belief network (DBN). Facing different types of attacks, through multiple iterations of the GA, the optimal number of hidden layers and number of neurons in each layer are generated adaptively, so that the intrusion detection model based on the DBN achieves a high detection rate with a compact structure. Finally, the NSL-KDD dataset was used to simulate and evaluate the model and algorithms. The experimental results show that the improved intrusion detection model combined with DBN can effectively improve the recognition rate of intrusion attacks and reduce the complexity of the neural network structure.
引用
收藏
页码:31711 / 31722
页数:12
相关论文
共 36 条
  • [1] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
    Abduvaliyev, Abror
    Pathan, Al-Sakib Khan
    Zhou, Jianying
    Roman, Rodrigo
    Wong, Wai-Choong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
  • [2] Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
  • [3] Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
  • [4] [Anonymous], THESIS
  • [5] [Anonymous], 2017, SHALLOW DEEP NETWORK
  • [6] [Anonymous], 2007, EEC
  • [7] Critical study of neural networks in detecting intrusions
    Beghdad, Rachid
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 168 - 175
  • [8] Learning Deep Architectures for AI
    Bengio, Yoshua
    [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01): : 1 - 127
  • [9] Borgohain T., 2015, SURVEY OPERATING SYS
  • [10] A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network
    Chiba, Z.
    Abghour, N.
    Moussaid, K.
    El Omri, A.
    Rida, M.
    [J]. 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1200 - 1206