WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks

被引:29
作者
Jothi B. [1 ]
Pushpalatha M. [2 ]
机构
[1] Department of Software Engineering, SRM Institute of Science and Technology, Chennai
[2] Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai
关键词
Internet of Things (IoT); Intrusion detection system (IDS); Long Short Term Memory (LSTM); Recommendation Systems; Whale;
D O I
10.1007/s00779-021-01578-5
中图分类号
学科分类号
摘要
Internet of Things (IoT) and its applications have gained importance in recent times of research. The heterogeneous nature of IoT networks makes them applicable for various real-time applications and has become inseparable in everyone’s life. Although these IoT devices simplify day to day life activities, these networks are vulnerable to many security threats. Current insufficient security measures make the IoT networks the weakest links for defending the security attacks and, therefore, exciting targets to various attackers. A novel intrusion detection system (IDS) is proposed using powerful deep learning models. Motivated by Long Short Term Memory (LSTM) advantages, whale integrated LSTM (WILS) networks have been proposed to design intelligent IDS to detect the range of different scenarios of threats on IoT networks. The system comprises four essential functions: (i) Data collection unit, which profiles the regular performance of IoT devices connected in the networks, (ii) identifies the malicious devices on the network when an attack is happening, (iii) predicts the type of attacks deployed in the network. The extensive assessments of proposed IDS are done in terms of validation methods and protruding metrics for the various scenarios of IoT threats. The real-time scenario of IoT networks under various attacks has been developed with OMENT-python API, which has been used to analyze the different features of normal malicious nodes in the network. In addition, popular datasets such as CIDDS-001, UNSWNB15, and KDD datasets are used for benchmarking the proposed model. Further, we have employed extensive experiments to evaluate the proposed models and the other existing learning models. The WILS models have outdone the other existing intelligent models in accuracy, precision, and recall, proving their susceptibility for an IoT network. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
引用
收藏
页码:1285 / 1301
页数:16
相关论文
共 38 条
  • [1] Khan R., Khan S.U., Zaheer R., Khan S., Future Internet: The Internet of things architecture, possible applications and key challenges, Frontiers of Information Technology (FIT), pp. 257-260, (2012)
  • [2] Simon T., Chapter seven: Critical infrastructure and the Internet of things, Cyber Security in a Volatile World, (2017)
  • [3] Anthi E., Williams L., Burnap P., Pulse: An Adaptive Intrusion Detection for the Internet of Things, (2018)
  • [4] Cybersecurity Executive: Medical Devices A' Bulls-Eye' for Cyber-Attacks
  • [5] Anthi E., Javed A., Rana O., Theodorakopoulos G., Secure data sharing and analysis in cloud-based energy management systems, Cloud Infrastructures, Services, and Iot Systems for Smart Cities, pp. 228-242, (2017)
  • [6] Cyber Hackers Can Now Harm Human Life through Smart Meters — Smart Grid Awareness
  • [7] Securing the Internet of Things: A Proposed Framework - Cisco
  • [8] Xiao L., Wan X., Lu X., Zhang Y., Wu D., Iot Security Techniques Based on Machine Learning, (2018)
  • [9] Yu T., Sekar V., Seshan S., Agarwal Y., Xu C., Handling a trillion (Unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things, Proceedings of the 14Th ACM Workshop on Hot Topics in Networks, (2015)
  • [10] Diro A.A., Chilamkurti N., Distributed attack detection scheme using deep learning approach for Internet of things, Future Gen. Comput. Syst., 82, pp. 761-768, (2018)