IoT-based intrusion detection system using convolution neural networks

被引:12
作者
Aljumah, Abdullah [1 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Alkharj, Saudi Arabia
关键词
Internet of Things; Random Forest; Linear Regression; Intrusion Detection System; INTERNET; ENVIRONMENT;
D O I
10.7717/peerj-cs.721
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the Information and Communication Technology age, connected objects generate massive amounts of data traffic, which enables data analysis to uncover previously hidden trends and detect unusual network-load. We identify five core design principles to consider when designing a deep learning-empowered intrusion detection system (IDS). We proposed the Temporal Convolution Neural Network (TCNN), an intelligent model for IoT-IDS that aggregates convolution neural network (CNN) and generic convolution, based on these concepts. To handle unbalanced datasets, TCNN is accumulated with synthetic minority oversampling technique with nominal continuity. It is also used in conjunction with effective feature engineering techniques like attribute transformation and reduction. The presented model is compared to two traditional machine learning algorithms, random forest (RF) and logistic regression (LR), as well as LSTM and CNN deep learning techniques, using the Bot-IoT data repository. The outcomes of the experiments depicts that TCNN maintains a strong balance of efficacy and performance. It is better as compared to other deep learning IDSs, with a multi-class traffic detection accuracy of 99.9986 percent and a training period that is very close to CNN.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 30 条
[1]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[2]   DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System [J].
Aldhaheri, Sahar ;
Alghazzawi, Daniyal ;
Cheng, Li ;
Alzahrani, Bander ;
Al-Barakati, Abdullah .
APPLIED SCIENCES-BASEL, 2020, 10 (06)
[3]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[4]   Spider Monkey Optimization algorithm for numerical optimization [J].
Bansal, Jagdish Chand ;
Sharma, Harish ;
Jadon, Shimpi Singh ;
Clerc, Maurice .
MEMETIC COMPUTING, 2014, 6 (01) :31-47
[5]   Cognitive Framework of Food Quality Assessment in IoT-Inspired Smart Restaurants [J].
Bhatia, Munish ;
Manocha, Ankush .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09) :6350-6358
[6]   Fog-inspired smart home environment for domestic animal healthcare [J].
Bhatia, Munish ;
Sood, Sandeep K. ;
Manocha, Ankush .
COMPUTER COMMUNICATIONS, 2020, 160 :521-533
[7]   Internet of things-inspired healthcare system for urine-based diabetes prediction [J].
Bhatia, Munish ;
Kaur, Simranpreet ;
Sood, Sandeep K. ;
Behal, Veerawali .
ARTIFICIAL INTELLIGENCE IN MEDICINE, 2020, 107
[8]   Quantumized approach of load scheduling in fog computing environment for IoT applications [J].
Bhatia, Munish ;
Sood, Sandeep K. ;
Kaur, Simranpreet .
COMPUTING, 2020, 102 (05) :1097-1115
[9]   Quantum-based predictive fog scheduler for IoT applications [J].
Bhatia, Munish ;
Sood, Sandeep K. ;
Kaur, Simranpreet .
COMPUTERS IN INDUSTRY, 2019, 111 :51-67
[10]   Exploring Temporal Analytics in Fog-Cloud Architecture for Smart Office HealthCare [J].
Bhatia, Munish ;
Sood, Sandeep K. .
MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04) :1392-1410