Literature DB >> 33923180

A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning.

Raneem Qaddoura1, Ala' M Al-Zoubi2,3, Hossam Faris3,4, Iman Almomani3,5.   

Abstract

The security of IoT networks is an important concern to researchers and business owners, which is taken into careful consideration due to its direct impact on the availability of the services offered by IoT devices and the privacy of the users connected with the network. An intrusion detection system ensures the security of the network and detects malicious activities attacking the network. In this study, a deep multi-layer classification approach for intrusion detection is proposed combining two stages of detection of the existence of an intrusion and the type of intrusion, along with an oversampling technique to ensure better quality of the classification results. Extensive experiments are made for different settings of the first stage and the second stage in addition to two different strategies for the oversampling technique. The experiments show that the best settings of the proposed approach include oversampling by the intrusion type identification label (ITI), 150 neurons for the Single-hidden Layer Feed-forward Neural Network (SLFN), and 2 layers and 150 neurons for LSTM. The results are compared to well-known classification techniques, which shows that the proposed technique outperforms the others in terms of the G-mean having the value of 78% compared to 75% for KNN and less than 50% for the other techniques.

Entities:  

Keywords:  IoTID20; SMOTE; classification; deep learning; imbalanced; intrusion detection; neural network; oversampling

Year:  2021        PMID: 33923180     DOI: 10.3390/s21092987

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  7 in total

1.  Learning to forget: continual prediction with LSTM.

Authors:  F A Gers; J Schmidhuber; F Cummins
Journal:  Neural Comput       Date:  2000-10       Impact factor: 2.026

2.  Long short-term memory.

Authors:  S Hochreiter; J Schmidhuber
Journal:  Neural Comput       Date:  1997-11-15       Impact factor: 2.026

Review 3.  Deep learning in neural networks: an overview.

Authors:  Jürgen Schmidhuber
Journal:  Neural Netw       Date:  2014-10-13

Review 4.  Deep learning.

Authors:  Yann LeCun; Yoshua Bengio; Geoffrey Hinton
Journal:  Nature       Date:  2015-05-28       Impact factor: 49.962

5.  LSTM: A Search Space Odyssey.

Authors:  Klaus Greff; Rupesh K Srivastava; Jan Koutnik; Bas R Steunebrink; Jurgen Schmidhuber
Journal:  IEEE Trans Neural Netw Learn Syst       Date:  2016-07-08       Impact factor: 10.451

6.  Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks.

Authors:  Iman Almomani; Afnan Alromi
Journal:  Sensors (Basel)       Date:  2020-03-03       Impact factor: 3.576

7.  A Machine Learning Based Intrusion Detection System for Mobile Internet of Things.

Authors:  Amar Amouri; Vishwa T Alaparthy; Salvatore D Morgera
Journal:  Sensors (Basel)       Date:  2020-01-14       Impact factor: 3.576

  7 in total
  3 in total

1.  Android malware analysis in a nutshell.

Authors:  Iman Almomani; Mohanned Ahmed; Walid El-Shafai
Journal:  PLoS One       Date:  2022-07-05       Impact factor: 3.752

2.  WYSIWYG: IoT Device Identification Based on WebUI Login Pages.

Authors:  Ruimin Wang; Haitao Li; Jing Jing; Liehui Jiang; Weiyu Dong
Journal:  Sensors (Basel)       Date:  2022-06-29       Impact factor: 3.847

3.  Intrusion Detection Model for Industrial Internet of Things Based on Improved Autoencoder.

Authors:  Wumei Zhang; Yongzhen Zhang
Journal:  Comput Intell Neurosci       Date:  2022-05-27
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.