An Efficient Deep Learning Approach To IoT Intrusion Detection

被引:4
作者
Cao, Jin [1 ]
Lin, Liwei [2 ]
Ma, Ruhui [1 ]
Guan, Haibing [1 ]
Tian, Mengke [3 ,4 ]
Wang, Yong [4 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] FuJian Univ Technol, Sch Comp Sci & Math, Fuzhou 350028, Fujian, Peoples R China
[3] Peking Univ, Sch Integrated Circuits, Beijing 100871, Peoples R China
[4] Beijing Microelect Technol Inst, Beijing 100076, Peoples R China
关键词
IoT security; intrusion detection system; attack classification; stacked autoencoder;
D O I
10.1093/comjnl/bxac119
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Things (IoT), network security challenges are becoming more and more complex, and the scale of intrusion attacks against the network is gradually increasing. Therefore, researchers have proposed Intrusion Detection Systems and constantly designed more effective systems to defend against attacks. One issue to consider is using limited computing power to process complex network data efficiently. In this paper, we take the AWID dataset as an example, propose an efficient data processing method to mitigate the interference caused by redundant data and design a lightweight deep learning-based model to analyze and predict the data category. Finally, we achieve an overall accuracy of 99.77% and an accuracy of 97.95% for attacks on the AWID dataset, with a detection rate of 99.98% for the injection attack. Our model has low computational overhead and a fast response time after training, ensuring the feasibility of applying to edge nodes with weak computational power in the IoT.
引用
收藏
页码:2870 / 2879
页数:10
相关论文
共 28 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[3]  
Bengio Y., 2007, Advances in Neural Information Processing Systems, V19, P153
[4]  
Fenicia F., 2021, IEEE T INTELL TRANSP, DOI [10.5194/hess-2021-264, DOI 10.5194/HESS-2021-264, DOI 10.1109/TITS.2021.3129458]
[5]   A Mutually Supervised Graph Attention Network for Few-Shot Segmentation: The Perspective of Fully Utilizing Limited Samples [J].
Gao, Honghao ;
Xiao, Junsheng ;
Yin, Yuyu ;
Liu, Tong ;
Shi, Jiangang .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (04) :4826-4838
[6]   SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata [J].
Gao, Honghao ;
Zhang, Yida ;
Miao, Huaikou ;
Duran Barroso, Ramon J. ;
Yang, Xiaoxian .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) :2272-2297
[7]   SIREN: Byzantine-robust Federated Learning via Proactive Alarming [J].
Guo, Hanxi ;
Wang, Hao ;
Song, Tao ;
Hua, Yang ;
Lv, Zhangcheng ;
Jin, Xiulang ;
Xue, Zhengui ;
Ma, Ruhui ;
Guan, Haibing .
PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, :47-60
[8]   SSUR: An Approach to Optimizing Virtual Machine Allocation Strategy Based on User Requirements for Cloud Data Center [J].
Huang, Yuzhe ;
Xu, Huahu ;
Gao, Honghao ;
Ma, Xiaojin ;
Hussain, Walayat .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (02) :670-681
[9]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[10]   A deep learning method with wrapper based feature extraction for wireless intrusion detection system [J].
Kasongo, Sydney Mambwe ;
Sun, Yanxia .
COMPUTERS & SECURITY, 2020, 92 (92)