Intrusion Detection In IoT Using Artificial Neural Networks On UNSW-15 Dataset

被引:42
作者
Hanif, Sohaib [1 ]
Ilyas, Tuba [1 ]
Zeeshan, Muhammad [1 ]
机构
[1] Natl Univ Sci & Technol NUST Islamabad, Islamabad, Pakistan
来源
2019 IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEE HONET-ICT 2019) | 2019年
关键词
Intrusion Detection; ANN; Network Security; Machine Learning; IOT;
D O I
10.1109/honet.2019.8908122
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT devices are susceptible to numerous cyber-attacks due to its low power, low computational requirements and controlled environment that make it hard to implement authentication and cryptography in IoT devices. In this work we propose artificial neural network based threat detection for IoT to solve the authentication issues. We use supervised learning algorithm to detect the attacks and furthermore controller discards the commands after classifying it as threat. Proposed ANN consist of input, hidden and output layers. Input layer passes the data as signal to hidden layer where these signals are computed with the assigned weights and activation functions are used to transform an input to an output signal. Proposed technique is able to detect attacks effectively and timely decisions are taken to tackle the attacks. Proposed ANN approach achieves an average precision of 84% and less than %8 of average false positive rate in repeated 10-fold cross-validation. This reveals the robustness, precision and accuracy of proposed approach in large and heterogeneous dataset. Approach proposed in this work has the potential to considerably improve the utilization of intrusion detection systems.
引用
收藏
页码:152 / 156
页数:5
相关论文
共 18 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]  
[Anonymous], P 10THSCANDINAVIAN W
[3]  
[Anonymous], 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, DOI DOI 10.1109/ANTS.2016.7947776
[4]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[5]  
Hodo E, 2016, 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC)
[6]   Objects Communication Behavior on Multihomed Hybrid Ad Hoc Networks [J].
Leal, Bernardo ;
Atzori, Luigi .
INTERNET OF THINGS-BOOK, 2010, :3-11
[7]   AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks [J].
Li, Jiaqi ;
Zhao, Zhifeng ;
Li, Rongpeng ;
Zhang, Honggang .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2093-2102
[8]   Internet of things: Vision, applications and research challenges [J].
Miorandi, Daniele ;
Sicari, Sabrina ;
De Pellegrini, Francesco ;
Chlamtac, Imrich .
AD HOC NETWORKS, 2012, 10 (07) :1497-1516
[9]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[10]   The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set [J].
Moustafa, Nour ;
Slay, Jill .
INFORMATION SECURITY JOURNAL, 2016, 25 (1-3) :18-31