A Network Intrusion Detection System Based on Deep Learning Models in IoT Systems

سال انتشار: 1404
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 36

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_FRAI-1-2_001

تاریخ نمایه سازی: 13 مهر 1404

چکیده مقاله:

The Internet of Things (IoT) has a vital role in the lives of people today. However, as the use of IoT devices becomes more widespread, there is a growing concern about security threats, like botnet attacks. Therefore, the use of inclusive solutions is required.   Intrusion Detection Systems (IDS) can detect and mitigate attacks on IoT devices by analyzing network traffic and device behavior. This paper proposes an IDS that uses Deep Learning (DL) techniques. It is based on an ensemble learning model that employs diversity and F۱-score as a performance metric to select the best transfer learning models. It also proposes ۲۰ individual and hybrid DL models, including Convolution Neural Networks (CNN), Recurrent Neural Networks (RNNs), and Deep Neural Networks (DNN), to detect and classify regular and botnet attack classes. The proposed IDS engages a feature engineering method to reduce unnecessary computation. The Bot-IoT dataset used in this paper contained DDoS, DoS, Reconnaissance, and theft attack labels. The proposed IDS was compared with existing methods using the Bot-IoT dataset. Experimental results disclose a high performance of the proposed model for detecting and classifying various attack and regular labels.

نویسندگان

Payam Mahmoudi-Nasr

Department of Computer Engineering, University of Mazandaran, Mazandaran, Iran.

Mahdi Mousavand

Department of Computer Engineering, University of Mazandaran, Mazandaran, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • S. Smith, "IoT Connections To Reach ۸۳ Billion By ۲۰۲۴, ...
  • S. Li, L. D. Xu, and S. Zhao, "The internet ...
  • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet ...
  • I. H. Sarker, A. I. Khan, Y. B. Abushark, and ...
  • M. Injadat, A. Moubayed, and A. Shami, "Detecting botnet attacks ...
  • N. Nokia, "Threat intelligence report ۲۰۲۰," Comput. Fraud Secur, ۲۰۲۰. ...
  • "Global share of IoT attacks ۲۰۲۱." Statista. https://www.statista.com/statistics/۱۳۲۱۲۵۰/worldwide-internet-of-things-attacks/ (accessed March ...
  • T. Verdonck, B. Baesens, M. Óskarsdóttir, and S. vanden Broucke, ...
  • O. Sagi and L. Rokach, "Ensemble learning: A survey," Wiley ...
  • Y. Sun, A. K. Wong, and M. S. Kamel, "Classification ...
  • N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, "Towards ...
  • A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, "Survey ...
  • I. H. Sarker, "Machine learning: Algorithms, real-world applications and research ...
  • I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. ...
  • M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and ...
  • M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. ...
  • R. Vijayanand, D. Devaraj, and B. Kannapiran, "Intrusion detection system ...
  • M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, "Deep ...
  • M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, ...
  • M. Ge, X. Fu, N. Syed, Z. Baig, G. Teo, ...
  • M. Ge, N. F. Syed, X. Fu, Z. Baig, and ...
  • M. A. Ferrag and L. Maglaras, "DeepCoin: A novel deep ...
  • S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani, and A. ...
  • O. Alkadi, N. Moustafa, B. Turnbull, and K.-K. R. Choo, ...
  • B. A. NG and S. Selvakumar, "Anomaly detection framework for ...
  • S. I. Popoola, B. Adebisi, R. Ande, M. Hammoudeh, and ...
  • I. Ullah and Q. H. Mahmoud, "Design and development of ...
  • A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. ...
  • A. Derhab, A. Aldweesh, A. Z. Emam, and F. A. ...
  • I. Idrissi, M. Azizi, and O. Moussaoui, "IoT security with ...
  • V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, ...
  • K. Simran, S. Sriram, R. Vinayakumar, and K. Soman, "Deep ...
  • Z. Ahmad et al., "Anomaly detection using deep neural network ...
  • C. Yin, S. Zhang, J. Wang, and N. N. Xiong, ...
  • L. Aversano, M. L. Bernardi, M. Cimitile, and R. Pecori, ...
  • R. Vinayakumar, K. Soman, and P. Poornachandran, "Evaluation of recurrent ...
  • Y. Bengio, P. Simard, and P. Frasconi, "Learning long-term dependencies ...
  • S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural computation, ...
  • A. G. Felix, S. Jürgen, and C. Fred, "Learning to ...
  • R. Fu, Z. Zhang, and L. Li, "Using LSTM and ...
  • R. Vinayakumar, K. Soman, and P. Poornachandran, "Applying convolutional neural ...
  • M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, ...
  • A. Thakkar and R. Lohiya, "A review on machine learning ...
  • P. Branco, L. Torgo, and R. P. Ribeiro, "A survey ...
  • نمایش کامل مراجع