Negative Selection and Neural Network based Algorithm for Intrusion Detection in IoT

被引:0
|
作者
Pamukov, Marin E. [1 ]
Poulkov, Vladimir K. [1 ]
Shterev, Vasil A. [1 ]
机构
[1] Tech Univ Sofia, Telecommun Fac, Sofia, Bulgaria
来源
2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP) | 2018年
关键词
Neural Networks; Negative Selection; Intrusion Detection System;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things expands the boundaries of the Internet to encompass many devices with constraint computational and power capabilities. This limits the implementation of security techniques such as Intrusion Detection Systems. In this paper, we propose a novel classification algorithm specifically designed for Internet of Things Intrusion Detection Systems. Our solution consists of two distinct layers. First, we employ a Negative Selection algorithm for creating a training set based only on the knowledge of the normal network behavior. Based on this data we train a simple Neural Network that is used to do the actual classification. This multilayer approach allows to distance the training complexity from the computationally and power constrained IoT devices. Furthermore, the addition of Negative Selection layer allows us to train a Neural Network only based on the self/normal behavior of the network, without the need for nonself/attack data. We call this algorithm Negative Selection Neural Network (NSNN). We test the algorithm against the KDD NSL dataset. The test results lead to the conclusion that the proposed algorithm is capable of functioning as network intrusion detection classifier.
引用
收藏
页码:636 / 640
页数:5
相关论文
共 50 条
  • [21] Intrusion Detection of IoT Traffic Payload Based on Parallel Neural Networks
    Zhang, Yuhang
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 16 - 20
  • [22] Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network
    Bella, H. Kanakadurga
    Vasundra, S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (01) : 671 - 679
  • [23] Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network
    Mendonca, Robson V.
    Teodoro, Arthur A. M.
    Rosa, Renata L.
    Saadi, Muhammad
    Melgarejo, Dick Carrillo
    Nardelli, Pedro H. J.
    Rodriguez, Demostenes Z.
    IEEE ACCESS, 2021, 9 : 61024 - 61034
  • [24] IoT-based intrusion detection system using convolution neural networks
    Aljumah, Abdullah
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 19
  • [25] Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System
    Thakkar, Ankit
    Lohiya, Ritika
    INFORMATION FUSION, 2023, 90 : 353 - 363
  • [26] Evolving Neural Network Intrusion Detection System for MCPS
    Mowla, Nishat
    Doh, Inshil
    Chae, KiJoon
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 1040 - 1045
  • [27] Evolving Neural Network Intrusion Detection System for MCPS
    Mowla, Nishat
    Doh, Inshil
    Chae, KiJoon
    2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 183 - 187
  • [28] An improved equilibrium optimization algorithm for feature selection problem in network intrusion detection
    Varzaneh, Zahra Asghari
    Hosseini, Soodeh
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [29] A neural model for network intrusion detection
    Najarian, K
    Sun, XL
    Ahn, GJ
    Hadzikadic, M
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 554 - 559
  • [30] Neural network ensembles for intrusion detection
    Golovko, Vladimir
    Kachurka, Pavel
    Vaitsekhovich, Leanid
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 578 - 583