A Hybrid CNN Approach for Unknown Attack Detection in Edge-Based IoT Networks
DOI:
https://doi.org/10.4108/eetsis.4887Keywords:
IoT Security, Convolutional Neural Networks, CNNs, Unknown Attack Detection, BoT-IoT Dataset, Anomaly Detection, Transfer Learning, Data Augmentation, Imbalanced DataAbstract
INTRODUCTION: In the constantly growing Internet of Things (IoT), device security is crucial. As IoT gadgets pervade our lives, detecting unforeseen assaults is crucial to protecting them. Behavioral analysis, machine learning, and collaborative intelligence may be needed to protect against new dangers. This short discusses the need of detecting unexpected IoT attacks and essential security strategies for these interconnected environments.
OBJECTIVES: This research uses the BoT-IoT dataset to create an enhanced IoT intrusion detection system. The goals are to optimize a CNN architecture for effective pattern recognition, address imbalanced data, and evaluate model performance using precision, recall, F1-score, and AUC-ROC measures. Improving IoT ecosystem reliability and security against unknown assaults is the ultimate goal.
METHODS: The proposed methods use the BoT-IoT dataset to create a comprehensive IoT intrusion detection system. This involves tuning a Convolutional Neural Network (CNN) architecture to improve pattern recognition. Oversampling and class weighting address imbalanced data issues.
RESULTS: The comprehensive evaluation of our innovative unknown attack detection method shows promise, suggesting it may be better than existing methods. A high accuracy, precision, recall, and f-measure of 98.23% were attained using an advanced model and feature selection methods. This achievement was achieved by using features designed to identify unknown attacks in the dataset, proving the proposed methodology works.
CONCLUSION: This research presents an improved IoT Intrusion Detection System using the BoT-IoT dataset. The optimised Convolutional Neural Network architecture and imbalanced data handling approaches achieved 98.23% accuracy.
References
Papalkar, R. R., & Alvi, A. S. (2023). Review of unknown attack detection with deep learning techniques. In Artificial Intelligence, Blockchain, Computing and Security Volume 1 (pp. 989-997). CRC Press.
Alnakhalny, A., Zhang, Q., Li, S., & Wang, Y. (Year). Intelligent ICMPv6 flooding-attack detection for DDoS mitigation. Journal of Network Security, 12(1), 45-58.
Papalkar, R. R., & Alvi, A. S. (2022). Analysis of defense techniques for DDos attacks in IoT–A review. ECS Transactions, 107(1), 3061.
Papalkar, R. R., Alvi, A. S., Ali, S., Awasthy, M., & Kanse, R. (2023). An optimized feature selection guided light-weight machine learning models for DDoS attacks detection in cloud computing. In Artificial Intelligence, Blockchain, Computing and Security Volume 1 (pp. 975-982). CRC Press.
Papalkar, R. R. ., Alvi, A. S. ., Rathod, V., Usmani, A. ., Solavande, V. ., & Deshmukh, D. . (2023). Crow Way: An Optimization Technique for generating the Weight and Bias in Deep CNN . International Journal of Membrane Science and Technology, 10(2), 1732-1750. https://doi.org/10.15379/ijmst.v10i2.2647
Hasan, M., Hu, J., et al. (2018). "Deep Autoencoder-Based Anomaly Detection." IEEE Transactions on Cybernetics.
Kingma, D., et al. (2014). "Variational Autoencoder for Deep Learning of Images, Labels and Captions." NIPS (Conference on Neural Information Processing Systems).
Hochreiter, S., Schmidhuber, J. (1997). "Long Short-Term Memory." Neural Computation.
Goodfellow, I., et al. (2014). Generative Adversarial Nets. In Advances in Neural Information Processing Systems (NIPS).
Sabour, S., Hinton, G. E., et al. (2017). Dynamic Routing Between Capsules. In Advances in Neural Information Processing Systems (NIPS).
Vaswani, A., et al. (2017). Attention Is All You Need. In Advances in Neural Information Processing Systems (NIPS).
Breiman, L. (2001). A Gentle Introduction to Ensemble Learning. Machine Learning, 45(1), 5-32.
Ruder, S. (2018). Transfer Learning for Natural Language Processing. arXiv preprint arXiv:1706.05098.
Bahdanau, D., Cho, K., et al. (2015). Neural Machine Translation by Jointly Learning to Align and Translate. In International Conference on Learning Representations (ICLR).
Hinton, G. E., Osindero, S., Teh, Y. (2006). A Fast Learning Algorithm for Deep Belief Nets. Neural Computation, 18(7), 1527-1554.
Alabsi, B.A.; Anbar, M.; Rihan, S.D.A. CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks. Sensors 2023, 23, 6507. https://doi.org/10.3390/s23146507
M. Roopak, G. Yun Tian and J. Chambers, "Deep Learning Models for Cyber Security in IoT Networks," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0452-0457, doi: 10.1109/CCWC.2019.8666588.
Rathore H, Sharma SC, Sahay SK, Sewak M. Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks?. EAI Endorsed Scal Inf Syst [Internet]. 2022 May 31 [cited 2024 Mar. 26];10(1):e6.
R. Patil D, M. Pattewar T. Majority Voting and Feature Selection Based Network Intrusion Detection System. EAI Endorsed Scal Inf Syst [Internet]. 2022 Apr. 4 [cited 2024 Mar. 26];9(6):e6. Available from:
R. Patil D, M. Pattewar T. Majority Voting and Feature Selection Based Network Intrusion Detection System. EAI Endorsed Scal Inf Syst [Internet]. 2022 Apr. 4 [cited 2024 Mar. 26];9(6):e6. Available from:
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Rahul Rajendra Papalkar, Abrar S Alvi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.