Internet of Things (IoTs) Security: Intrusion Detection using Deep Learning
- 13 October 2021
- journal article
- research article
- Published by River Publishers in Journal of Web Engineering
- Vol. 20 (6), 1721-1760
- https://doi.org/10.13052/jwe1540-9589.2062
Abstract
With the development of sensor and communication technologies, the use of connected devices in industrial applications has been common for a long time. Reduction of costs during this period and the definition of Internet of Things (IoTs) concept have expanded the application area of small connected devices to the level of end-users. This paved the way for IoT technology to provide a wide variety of application alternative and become a part of daily life. Therefore, a poorly protected IoT network is not sustainable and has a negative effect on not only devices but also the users of the system. In this case, protection mechanisms which use conventional intrusion detection approaches become inadequate. As the intruders’ level of expertise increases, identification and prevention of new kinds of attacks are becoming more challenging. Thus, intelligent algorithms, which are capable of learning from the natural flow of data, are necessary to overcome possible security breaches. Many studies suggesting models on individual attack types have been successful up to a point in recent literature. However, it is seen that most of the studies aiming to detect multiple attack types cannot successfully detect all of these attacks with a single model. In this study, it is aimed to suggest an all-in-one intrusion detection mechanism for detecting multiple intrusive behaviors and given network attacks. For this aim, a custom deep neural network is designed and implemented to classify a number of different types of network attacks in IoT systems with high accuracy and F1-score. As a test-bed for comparable results, one of the up-to-date dataset (CICIDS2017), which is highly imbalanced, is used and the reached results are compared with the recent literature. While the initial propose was successful for most of the classes in the dataset, it was noted that achievement was low in classes with a small number of samples. To overcome imbalanced data problem, we proposed a number of augmentation techniques and compared all the results. Experimental results showed that the proposed methods yield highest efficiency among observed literature.Keywords
This publication has 26 references indexed in Scilit:
- A survey on Internet of Things architecturesJournal of King Saud University - Computer and Information Sciences, 2018
- UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSsComputers & Security, 2018
- Xception: Deep Learning with Depthwise Separable ConvolutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Internet of Things security: A surveyJournal of Network and Computer Applications, 2017
- A survey of intrusion detection systems based on ensemble and hybrid classifiersComputers & Security, 2017
- The SMT-based automatic road network generation in vehicle simulation environmentPublished by Association for Computing Machinery (ACM) ,2016
- A survey on trust management for Internet of ThingsJournal of Network and Computer Applications, 2014
- The Cyber Attack on Saudi AramcoSurvival, 2013
- Toward developing a systematic approach to generate benchmark datasets for intrusion detectionComputers & Security, 2012
- Stuxnet and the Future of Cyber WarSurvival, 2011