A comprehensive deep learning benchmark for IoT IDS

被引:34
作者
Ahmad, Rasheed [1 ]
Alsmadi, Izzat [2 ]
Alhamdani, Wasim [1 ]
Tawalbeh, Lo'ai [2 ]
机构
[1] Univ Cumberlands, 6178 Coll Stn Dr, Williamsburg, KY 40769 USA
[2] Univ Texas A&M San Antonio, One Univ Way, San Antonio, TX 78224 USA
关键词
Intrusion detection system (IDS); Machine learning; Deep learning; Large-scale attacks; Internet of Things (IoT); Benchmark network dataset; NETWORK INTRUSION DETECTION; ATTACK DETECTION; DETECTION SYSTEM; INTERNET; THINGS; SURVEILLANCE; ANALYTICS; FRAMEWORK;
D O I
10.1016/j.cose.2021.102588
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of an intrusion detection system (IDS) in networks security cannot be overstated in detecting and responding to malicious attacks. Failure to detect large-scale attacks like DDoS not only makes the networks vulnerable, but a failure of critical lifesaving medical and industrial equipment can also put human lives at risk. Lack of availability of comprehensive and quality network datasets and the narrow scope to build an IDS based on a single machine learning classifier adds further limitations. Such issues can risk producing inaccurate or biased results in the solutions proposed by various researchers. Toward this end, this paper analyzed several datasets (old, recent, non-IoT, and IoT specific) using several individual and hybrid deep learning classifiers. Our goal is to establish a benchmark that can compare several classification models on several datasets to limit (1) dataset quality issues and (2) possible bias in produced results. We reported our empirical results by revealing exciting findings on some of the classifiers, which took hours to converge but could not successfully detect attacks. In contrast, others quickly converged and were able to produce the best results in terms of accuracy and other performance metrics. We believe that this paper's findings will help build a comprehensive IDS by recognizing that classification or prediction models should be trained beyond a limited scope of one dataset or application. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 100 条
  • [51] Kayyali B., 2013, MCKINSEY CO, V2, P1
  • [52] Kelly C., 2020, 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), P1
  • [53] Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
    Koroniotis, Nickolaos
    Moustafa, Nour
    Sitnikova, Elena
    Turnbull, Benjamin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 779 - 796
  • [54] Kumar A, 2019, 2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P289, DOI [10.1109/wf-iot.2019.8767194, 10.1109/WF-IoT.2019.8767194]
  • [55] Lai YC, 2019, 2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1154
  • [56] Lakkaraju H., 2016, PROC 30 C NEURAL INF, P5
  • [57] Lane N., 2016, P MOBICASE, P98
  • [58] Lane N. D., 2015, P 2015 INT WORKSH IN, P7, DOI DOI 10.1145/2820975.2820980
  • [59] Liang F, 2020, IEEE INTERNET THINGS, V7, P4329, DOI [10.1109/JIOT.2019.2963635, 10.1109/jiot.2019.2963635]
  • [60] A Long Short-Term Memory Enabled Framework for DDoS Detection
    Liang, Xiaoyu
    Znati, Taieb
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,