WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks

被引:29
作者
Jothi B. [1 ]
Pushpalatha M. [2 ]
机构
[1] Department of Software Engineering, SRM Institute of Science and Technology, Chennai
[2] Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai
关键词
Internet of Things (IoT); Intrusion detection system (IDS); Long Short Term Memory (LSTM); Recommendation Systems; Whale;
D O I
10.1007/s00779-021-01578-5
中图分类号
学科分类号
摘要
Internet of Things (IoT) and its applications have gained importance in recent times of research. The heterogeneous nature of IoT networks makes them applicable for various real-time applications and has become inseparable in everyone’s life. Although these IoT devices simplify day to day life activities, these networks are vulnerable to many security threats. Current insufficient security measures make the IoT networks the weakest links for defending the security attacks and, therefore, exciting targets to various attackers. A novel intrusion detection system (IDS) is proposed using powerful deep learning models. Motivated by Long Short Term Memory (LSTM) advantages, whale integrated LSTM (WILS) networks have been proposed to design intelligent IDS to detect the range of different scenarios of threats on IoT networks. The system comprises four essential functions: (i) Data collection unit, which profiles the regular performance of IoT devices connected in the networks, (ii) identifies the malicious devices on the network when an attack is happening, (iii) predicts the type of attacks deployed in the network. The extensive assessments of proposed IDS are done in terms of validation methods and protruding metrics for the various scenarios of IoT threats. The real-time scenario of IoT networks under various attacks has been developed with OMENT-python API, which has been used to analyze the different features of normal malicious nodes in the network. In addition, popular datasets such as CIDDS-001, UNSWNB15, and KDD datasets are used for benchmarking the proposed model. Further, we have employed extensive experiments to evaluate the proposed models and the other existing learning models. The WILS models have outdone the other existing intelligent models in accuracy, precision, and recall, proving their susceptibility for an IoT network. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
引用
收藏
页码:1285 / 1301
页数:16
相关论文
共 38 条
  • [11] Shanthamallu U.S., Spanias A., Tepedelenlioglu C., A brief survey of machine learning methods and their sensor and IoT applications, 8Th International Conference on Information, (2017)
  • [12] Doshi R., Apthorpe N., Feamster N., Machine Learning Ddos Detection for Consumer Internet of Things Devices, (2018)
  • [13] Shukla P., Ml-ids: A machine learning approach to detect wormhole attacks in Internet of things, Intelligent Systems Conference (Intellisys), pp. 234-240, (2017)
  • [14] Seyhan K., Nguyen T.N., Akleylek S., Cengiz K., Islam S.H., Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security, Journal of Information Security and Applications, 58, (2021)
  • [15] Verma A., Ranga V., Machine Learning Based Intrusion Detection Systems for IoT Applications, Wireless Personal Communications, (2020)
  • [16] Kasinathan P., Costamagna G., Khaleel H., Pastrone C., Spirito M.A., Demo: an ids framework for Internet of Things empowered by 6lowpan, Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (CCS' 13), pp. 1337-1340, (2013)
  • [17] Tama B.A., Rhee K.H., An in-depth experimental study of anomaly detection using gradient boosted machine, Neural Computing and Applications, 31, 4, pp. 955-965, (2019)
  • [18] Primartha R., Tama B.A., Anomaly detection using random forest: A performance revisited, 2017 International Conference on Data and Software Engineering (Icodse). IEEE, pp. 1-6, (2017)
  • [19] Hassan M.M., Gumaei A., Alsanad A., Alrubaian M., Fortino G., A hybrid deep learning model for efficient intrusion detection in big data environment, Information Sciences, (2019)
  • [20] Krawczyk B., Minku L.L., Gama J., Stefanowski J., Wozniak M., Ensemble learning for data stream analysis: a survey, Information Fusion, 37, pp. 132-156, (2017)