A Stacked Deep Learning Approach for IoT Cyberattack Detection

被引:24
作者
Alotaibi, Bandar [1 ]
Alotaibi, Munif [2 ]
机构
[1] Univ Tabuk, Dept Informat Technol, Tabuk, Saudi Arabia
[2] Shaqra Univ, Dept Comp Sci, Shaqra, Saudi Arabia
关键词
INTRUSION DETECTION SYSTEM; INTERNET; SECURE;
D O I
10.1155/2020/8828591
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of things (IoT) devices and applications are dramatically increasing worldwide, resulting in more cybersecurity challenges. Among these challenges are malicious activities that target IoT devices and cause serious damage, such as data leakage, phishing and spamming campaigns, distributed denial-of-service (DDoS) attacks, and security breaches. In this paper, a stacked deep learning method is proposed to detect malicious traffic data, particularly malicious attacks targeting IoT devices. The proposed stacked deep learning method is bundled with five pretrained residual networks (ResNets) to deeply learn the characteristics of the suspicious activities and distinguish them from normal traffic. Each pretrained ResNet model consists of 10 residual blocks. We used two large datasets to evaluate the performance of our detection method. We investigated two heterogeneous IoT environments to make our approach deployable in any IoT setting. Our proposed method has the ability to distinguish between benign and malicious traffic data and detect most IoT attacks. The experimental results show that our proposed stacked deep learning method can provide a higher detection rate in real time compared with existing classification techniques.
引用
收藏
页数:10
相关论文
共 34 条
  • [1] Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review
    Alotaibi, Bandar
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (23) : 10953 - 10971
  • [2] [Anonymous], 2020, MCAFEE LABS COVID 19
  • [3] Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems
    Anthi, Eirini
    Javed, Amir
    Rana, Omer
    Theodorakopoulos, George
    [J]. CLOUD INFRASTRUCTURES, SERVICES, AND IOT SYSTEMS FOR SMART CITIES, 2018, 189 : 228 - 242
  • [4] A Supervised Intrusion Detection System for Smart Home IoT Devices
    Anthi, Eirini
    Williams, Lowri
    Slowinska, Malgorzata
    Theodorakopoulos, George
    Burnap, Pete
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 9042 - 9053
  • [5] EclipseloT: A secure and adaptive hub for the Internet of Things
    Anthi, Eirini
    Ahmad, Shazaib
    Rana, Omer
    Theodorakopoulos, George
    Burnap, Pete
    [J]. COMPUTERS & SECURITY, 2018, 78 : 477 - 490
  • [6] Improving IoT Botnet Investigation Using an Adaptive Network Layer
    Ceron, Joao Marcelo
    Steding-Jessen, Klaus
    Hoepers, Cristine
    Granville, Lisandro Zambenedetti
    Margi, Cintia Borges
    [J]. SENSORS, 2019, 19 (03):
  • [7] Chan W, 2016, INT CONF ACOUST SPEE, P4960, DOI 10.1109/ICASSP.2016.7472621
  • [8] Xception: Deep Learning with Depthwise Separable Convolutions
    Chollet, Francois
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1800 - 1807
  • [9] Chollet Francois, 2015, Keras
  • [10] Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
    Derhab, Abdelouahid
    Guerroumi, Mohamed
    Gumaei, Abdu
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Mukherjee, Mithun
    Khan, Farrukh Aslam
    [J]. SENSORS, 2019, 19 (14)