IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction

被引:62
作者
Lee, Seo Jin [1 ]
Yoo, Paul D. [2 ]
Asyhari, A. Taufiq [3 ]
Jhi, Yoonchan [4 ]
Chermak, Lounis [1 ]
Yeun, Chan Yeob [5 ]
Taha, Kamal [5 ]
机构
[1] Def Acad United Kingdom, Cranfield Sch Def & Secur, CEWIC, Swindon SN6 8LA, Wilts, England
[2] Univ London, Birkbeck Coll, Dept CSIS, London WC1E 7HX, England
[3] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
[4] Samsung SDS, Secur Res Ctr, Seoul 135918, South Korea
[5] Khalifa Univ, Dept EECS, C2PS, Abu Dhabi, U Arab Emirates
关键词
IoT security; intrusion detection; feature engineering; mutual information; machine learning; edge computing; INTRUSION-DETECTION; INTERNET;
D O I
10.1109/ACCESS.2020.2985089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An ever-increasing number of computing devices interconnected through wireless networks encapsulated in the cyber-physical-social systems and a significant amount of sensitive network data transmitted among them have raised security and privacy concerns. Intrusion detection system (IDS) is known as an effective defence mechanism and most recently machine learning (ML) methods are used for its development. However, Internet of Things (IoT) devices often have limited computational resources such as limited energy source, computational power and memory, thus, traditional ML-based IDS that require extensive computational resources are not suitable for running on such devices. This study thus is to design and develop a lightweight ML-based IDS tailored for the resource-constrained devices. Specifically, the study proposes a lightweight ML-based IDS model namely IMPACT (IMPersonation Attack deteCTion using deep auto-encoder and feature abstraction). This is based on deep feature learning with gradient-based linear Support Vector Machine (SVM) to deploy and run on resource-constrained devices by reducing the number of features through feature extraction and selection using a stacked autoencoder (SAE), mutual information (MI) and C4.8 wrapper. The IMPACT is trained on Aegean Wi-Fi Intrusion Dataset (AWID) to detect impersonation attack. Numerical results show that the proposed IMPACT achieved 98.22% accuracy with 97.64% detection rate and 1.20% false alarm rate and outperformed existing state-of-the-art benchmark models. Another key contribution of this study is the investigation of the features in AWID dataset for its usability for further development of IDS.
引用
收藏
页码:65520 / 65529
页数:10
相关论文
共 16 条
[1]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[2]   Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach [J].
Aminanto, Muhamad Erza ;
Kim, Kwangjo .
INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 :136-147
[3]   Internet of Things: Evolution and technologies from a security perspective [J].
Ande, Ruth ;
Adebisi, Bamidele ;
Hammoudeh, Mohammad ;
Saleem, Jibran .
SUSTAINABLE CITIES AND SOCIETY, 2020, 54
[4]  
Choudhary G, 2018, INT WIREL COMMUN, P560, DOI 10.1109/IWCMC.2018.8450305
[5]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[6]   Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Gritzalis, Stefanos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :184-208
[7]   ON INFORMATION AND SUFFICIENCY [J].
KULLBACK, S ;
LEIBLER, RA .
ANNALS OF MATHEMATICAL STATISTICS, 1951, 22 (01) :79-86
[8]   A Comprehensive Study of Security of Internet-of-Things [J].
Mosenia, Arsalan ;
Jha, Niraj K. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) :586-602
[9]  
Panetta K., 2018, Gartner Top 10 Strategic Technol. Trends for 2019
[10]  
Panetta K., 2019, Gartner