| Literature DB >> 35062393 |
Xuan-Ha Nguyen1,2, Xuan-Duong Nguyen3,2, Hoang-Hai Huynh1,2, Kim-Hung Le1,2.
Abstract
Cyber security has become increasingly challenging due to the proliferation of the Internet of things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the Internet. However, these devices possess various security flaws resulting from the lack of defense mechanisms and hardware security support, therefore making them vulnerable to cyber attacks. In addition, IoT gateways provide very limited security features to detect such threats, especially the absence of intrusion detection methods powered by deep learning. Indeed, deep learning models require high computational power that exceeds the capacity of these gateways. In this paper, we introduce Realguard, an DNN-based network intrusion detection system (NIDS) directly operated on local gateways to protect IoT devices within the network. The superiority of our proposal is that it can accurately detect multiple cyber attacks in real time with a small computational footprint. This is achieved by a lightweight feature extraction mechanism and an efficient attack detection model powered by deep neural networks. Our evaluations on practical datasets indicate that Realguard could detect ten types of attacks (e.g., port scan, Botnet, and FTP-Patator) in real time with an average accuracy of 99.57%, whereas the best of our competitors is 98.85%. Furthermore, our proposal effectively operates on resource-constraint gateways (Raspberry PI) at a high packet processing rate reported about 10.600 packets per second.Entities:
Keywords: IoT gateways; deep neural network; network intrusion detection system
Mesh:
Year: 2022 PMID: 35062393 PMCID: PMC8778231 DOI: 10.3390/s22020432
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
The summary of related works on NIDS.
| Year | Authors | Research Aspect | Model | Datasets | Num of Label | Data Analyzed | Performance |
|---|---|---|---|---|---|---|---|
| 2017 | Midi et al. [ | Kalis: An IDS capable of detecting | Signature | Custom dataset | 8 | Packet-based | ACC = 100% |
| 2017 | Liu et al. [ | A CNN-base NIDS | CNN | KDD-Cup99 | 5 | Flow-based | DR = 97.66% |
| 2018 | Mirsky et al. [ | An Ensemble of Autoencoders | ANN | Custom dataset | 10 | Packet-based | TPR = 99.99%, |
| 2019 | Ahmim et al. [ | NIDS that incorporate diverse | REP Tree, | CICIDS2017 | 15 | Flow-based | DR = 94.475% |
| 2019 | Faker et al. [ | Intrusion detection on | DNN; RF; | CICIDS2017 | 14 | Flow-based | ACC= 91–98% |
| 2020 | Wang et al. [ | A deep hierarchical model for detecting | CNN-LSTM; | ISCX2012 | 5 | Packet-based | ACC = 99–100% |
| 2020 | Sun et al. [ | A hybrid model of CNN and LSTM | CNN + LSTM | CICIDS2017 | 7 | Flow-based | ACC = 98.67% |
| 2020 | Mohammadpour | New CNN architecture for detecting | CNN | CICIDS2017 | 11 | Flow-based | ACC = 99.46% |
| 2020 | Kaiyuan et al. [ | A NIDS incorporated hybrid sampling | CNN + | NSL-KDD | 5 | Flow-based | ACC = 76–82% |
| Our | Realguard: Realtime IDS | DNN | CICIDS2017 | 11 | Packet-based | ACC = 99.93% |
Figure 1The workflow of the Realguard IDS.
Figure 2The architecture of the attack detection model.
The environments used to evaluate Realguard.
| Edge Gateway | Edge Server | ||
|---|---|---|---|
| CPU | Type | Broadcom BCM2711 | Intel i7-9750H |
| Clock | 1.5 GHz | 2.60 GHz | |
| Cores | Quad core | 4 (8 logical) | |
| RAM | 8 GB | 16 GB | |
Details of the evaluated datasets.
| Attack Type | Description | Total Packet | Used Packet |
|---|---|---|---|
| Normal | Normal connection | 11,926,723 | 400,000 |
| FTP-Patator | File transfer protocol—brute force attack | 110,736 | 110,736 |
| SSH-Patator | Secure shell protocol—brute force attack | 136,073 | 136,073 |
| DoS Slowloris | Attackers flood the victim machine with | 47,596 | 47,596 |
| DoS Slowhttptest | Attackers flood the victim machine with | 39,254 | 39,254 |
| DoS Hulk | Attackers flood the victim machine with | 2,245,526 | 200,000 |
| DoS GoldenEye | Attackers flood the victim machine with | 106,177 | 106,177 |
| Heartbleed Port 444 | Exploited by sending a malformed heartbeat | 47,551 | 47,551 |
| Botnet ARES | Zombie machine controlled by bot onwer, | 9871 | 9871 |
| DDoS LOIT | Distributed Denial of Service is an attempt to | 1,280,602 | 200,000 |
| Port Scan | Specify which port is opening for a particular | 327,253 | 200,000 |
Figure 3The experiment results of the binary-class attack detection.
Comparing binary detection performance between Realguard and its competitors.
| (%) | Realguard | NB-SVM | DT-EnSVM | DBN | PSO+LSTM-RNN | PSO+DNN | XGB | AE+ANN |
|---|---|---|---|---|---|---|---|---|
| | | 99.46 | 99.15 | 99.00 | 98.68 | 97.58 | 97.40 | 95.81 |
|
| 0.40 | 3.00 | 4.00 | 2.10 |
| 0.28 | 12.00 | 1.23 |
|
|
| 98.92 | 98.46 | 98.24 | 98.83 | 97.85 | 91.36 | 98.18 |
Figure 4The experiment results of the multi-class classification.
Figure 5Comparing the TPR value of the multi-class attack detection between Realguard and its competitors.
Figure 6Comparing the FPR value of the multi-class attack detection between Realguard and its competitors.
Details of comparing multi-class attack detection quality between Realguard and its competitors.
| (%) | Realguard | MLP | CNN-MCL | XGB | RF | SVC | ANN | LSTM | E-ML | REP Tree |
|---|---|---|---|---|---|---|---|---|---|---|
| | 99.60 | 99.66 | x | 99.85 | | 98.89 | 99.73 | 99.69 | x | x |
|
|
| 91.39 | 95.19 | x | 64.45 | 79.18 | 38.36 | 35.81 | 46.47 | 47.76 |
|
| 99.48 |
| 91.50 | 94.45 | 99.36 | 83.65 | 98.82 | 98.64 | 93.84 | 75.36 |
|
|
|
| 98.71 | 99.27 | 99.76 | 99.91 | 99.08 | 97.62 | 67.57 | 66.43 |
|
| 99.52 |
| 97.96 | 91.62 | 99.14 | 98.04 | 98.27 | 97.07 | 97.76 | 92.73 |
|
| 98.45 | 97.54 | 99.10 |
| 99.85 | 93.36 | 99.73 | 99.02 | 96.78 | 92.22 |
|
| 99.92 |
| 99.77 | x | 99.94 | 99.95 | 99.62 | 99.68 | 99.64 | 99.18 |
|
| 99.92 | 99.95 | 98.16 | x | 99.75 | 99.42 | 98.30 | 96.61 | 99.91 |
|
|
| 99.98 | 99.99 | x |
| x | 99.97 | x | x |
|
|
|
|
|
| 99.19 | x | 99.94 | 99.98 | 99.91 | 99.88 | 99.88 | 99.79 |
| | 99.94 | 99.28 | 99.86 | x | | 99.39 | 99.81 | 99.92 | 99.88 | 99.88 |
| TPR (Avg) |
| 98.85 | 97.72 | 97.52 | 96.21 | 95.61 | 93.16 | 92.39 | 90.17 | 87.33 |
| FPR (Overall) |
| 0.06 | 0.23 | 0.24 | 0.24 | 0.20 | 0.63 | 0.79 | 1.15 | 4.84 |
| ACC (Overall) |
| 99.89 | 99.46 | 99.54 | 99.86 | 99.64 | 99.58 | 99.57 | 96.67 | 93.40 |
Comparing runtime performance between Realguard and its competitors.
| Train Rate (pkg/s) | Exec Rate (pkg/s) | ||
|---|---|---|---|
| Our | PC | 6000 | 88,200 |
| Ras | 1150 | 10,600 | |
| Kitsune [ | PC | 1100 | 37,300 |
| Ras | x | 5400 | |
| Ahmim et al. [ | PC | 200 | 17,600 |
| Ras | x | x | |
Compare resource consumption on Rasp Pi between Realguard and others.
| Realguard | Kitsune | RF | LSTM | |
|---|---|---|---|---|
|
| 36.0 |
| 76.8 | 47.6 |
|
|
| 156.3 | 180.3 | 143.1 |