Document Type : Technical Paper

Authors

1 Department of Computer Engineering, Yazd University, Yazd, Iran.

2 Department of Electrical Engineering, Yazd University, Yazd, Iran.

Abstract

IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning techniques and pristine data. We utilize the publicly available CICIDS2017 dataset, which enables comprehensive training and testing of intrusion detection models across various attack scenarios, such as Distributed Denial of Service (DDoS) attacks, port scans, botnet activity, and more. Our goal is to provide a more effective method than the previous methods. Our proposed deep learning model incorporates dense transition layers and LSTM architecture, designed to capture both spatial and temporal dependencies within the data. We employed rigorous evaluation metrics, including sparse categorical cross-entropy loss and accuracy, to assess model performance. The results of our approach show outstanding accuracy, reaching a peak of 0.997 on the test data. Our model demonstrates stability in loss and accuracy metrics, ensuring reliable intrusion detection capabilities. Comparative analysis with other machine learning models confirms the effectiveness of our approach. Moreover, our study assesses the model's resilience to Gaussian noise, revealing its capacity to maintain accuracy in challenging conditions. We provide detailed performance metrics for various attack types, offering insights into the model's effectiveness across diverse threat scenarios.

Keywords

Main Subjects

[1] E. Gyamfi and A. D. Jurcut, “Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM,” IEEE Internet of Things Journal, Vol. 10, No. 5, pp. 3827–3839, Mar. 2023, doi: 10.1109/JIOT.2022.3172393.
 
[2] X. Deng, J. Zhu, X. Pei, L. Zhang, Z. Ling, and K. Xue, “Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks,” IEEE Transactions on Network and Service Management, Vol. 20, No. 1, pp. 684–696, Mar. 2023, doi: 10.1109/TNSM.2022.3213807.
 
[3] Y. Wu, L. Nie, S. Wang, Z. Ning, and S. Li, “Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach,” IEEE Internet of Things Journal, Vol. 10, No. 4, pp. 3094–3106, Feb. 2023, doi: 10.1109/JIOT.2021.3112159.
 
[4] J. Wu et al., “Joint semantic transfer network for IoT intrusion detection,” IEEE Internet of Things Journal, Vol. 10, No. 4, pp. 3368–3383, Feb. 2023, doi: 10.1109/JIOT.2022.3218339.
 
[5] P. Ruzafa-Alcázar et al., “Intrusion detection based on privacy-preserving federated learning for the industrial IoT,” IEEE Transactions on Industrial Informatics, Vol. 19, No. 2, pp. 1145–1154, Feb. 2023, doi: 10.1109/TII.2021.3126728.
 
[6] J. Long, W. Liang, K.-C. Li, Y. Wei, and M. D. Marino, “A regularized cross-layer ladder network for intrusion detection in industrial internet of things,” IEEE Transactions on Industrial Informatics, Vol. 19, No. 2, pp. 1747–1755, Feb. 2023, doi: 10.1109/TII.2022.3204034.
 
[7] A. Oseni et al., “An explainable deep learning framework for resilient intrusion detection in IoT-Enabled transportation networks,” IEEE Transactions on Intelligent Transportation Systems, Vol. 24, No. 1, pp. 1000–1014, Jan. 2023, doi: 10.1109/TITS.2022.3188671.
 
[8] Sk. T. Mehedi, A. Anwar, Z. Rahman, K. Ahmed, and R. Islam, “Dependable intrusion detection system for IoT: A deep transfer learning based approach,” IEEE Transactions on Industrial Informatics, Vol. 19, No. 1, pp. 1006–1017, Jan. 2023, doi: 10.1109/TII.2022.3164770.
 
[9] S. Bebortta, S. K. Das, and S. Chakravarty, “Fog-enabled intelligent network intrusion detection framework for internet of things applications,” in 13th international conference on cloud computing, data science & engineering (confluence), Jan. 2023, pp. 485–490. doi: 10.1109/Confluence56041.2023. 10048841.
 
[10] M. M. Alani and A. I. Awad, “An intelligent two-layer intrusion detection system for the internet of things,” IEEE Transactions on Industrial Informatics, Vol. 19, No. 1, pp. 683–692, Jan. 2023, doi: 10.1109/TII.2022.3192035.
 
[11] J. Wu, H. Dai, Y. Wang, K. Ye, and C. Xu, “Heterogeneous domain adaptation for IoT intrusion detection: A geometric graph alignment approach,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3239872.
 
[12] A. Thakkar and R. Lohiya, “Attack classification of imbalanced intrusion data for IoT network using ensemble learning-based deep neural network,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3244810.
 
[13] A. A. M. Sharadqh, H. Hatamleh, A. M. A. Alnaser, S. S. Saloum, and T. A. Alawneh, “Hybrid chain: Blockchain enabled framework for bi-level intrusion detection and graph-based mitigation for security provisioning in edge assisted IoT environment,” IEEE Access, pp. 1–1, 2023, doi: 10.1109/ACCESS.2023.3256277.
 
[14] Z. Ma, L. Liu, W. Meng, X. Luo, L. Wang, and W. Li, “ADCL: Towards an adaptive network intrusion detection system using collaborative learning in IoT networks,” IEEE Internet of Things Journal, pp. 1–1, 2023, doi: 10.1109/JIOT.2023.3248259.
 
[15] I. A. Kandhro et al., “Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023, doi: 10.1109/ACCESS.2023.3238664.
 
[16] A. Telikani, J. Shen, J. Yang, and P. Wang, “Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing,” IEEE Internet of Things Journal, Vol. 9, No. 22, pp. 23260–23271, Nov. 2022, doi: 10.1109/JIOT.2022.3188224.
 
[17] O. Abdel Wahab, “Intrusion detection in the IoT under data and concept drifts: Online deep learning approach,” IEEE Internet of Things Journal, Vol. 9, No. 20, pp. 19706–19716, Oct. 2022, doi: 10.1109/JIOT.2022.3167005.
 
[18] W. Liang, Y. Hu, X. Zhou, Y. Pan, and K. I.-K. Wang, “Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT,” IEEE Transactions on Industrial Informatics, Vol. 18, No. 8, pp. 5087–5095, Aug. 2022, doi: 10.1109/TII.2021.3116085.
 
[19] X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I.-K. Wang, “Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system,” IEEE Internet of Things Journal, Vol. 9, No. 12, pp. 9310–9319, Jun. 2022, doi: 10.1109/JIOT.2021.3130434.
 
[20] T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and F. T. H. den Hartog, “ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets,” IEEE Internet of Things Journal, Vol. 9, No. 1, pp. 485–496, Jan. 2022, doi: 10.1109/JIOT.2021.3085194.
 
[21] M. Zeeshan et al., “Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and bot-IoT data-sets,” IEEE Access, Vol. 10, pp. 2269–2283, 2022, doi: 10.1109/ACCESS.2021.3137201.
 
[22] H. Siddharthan, T. Deepa, and P. Chandhar, “SENMQTT-SET: An intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features,” IEEE Access, Vol. 10, pp. 33095–33110, 2022, doi: 10.1109/ACCESS.2022.3161566.
 
[23] M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Rafiq, and W. A. M. Abdullah, “Towards SDN-Enabled, intelligent intrusion detection system for internet of things (IoT),” IEEE Access, Vol. 10, pp. 22756–22768, 2022, doi: 10.1109/ACCESS.2022.3153716.
 
[24] C. Miranda, G. Kaddoum, A. Boukhtouta, T. Madi, and H. A. Alameddine, “Intrusion prevention scheme against rank attacks for software-defined low power IoT networks,” IEEE Access, Vol. 10, pp. 129970–129984, 2022, doi: 10.1109/ACCESS.2022.3228170.
 
[25] P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti, and T.-H. Kim, “Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey,” IEEE Access, Vol. 10, pp. 121173–121192, 2022, doi: 10.1109/ACCESS.2022.3220622.
 
[26] Y. Yang, K. Zheng, C. Wu, and Y. Yang, Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network, Sensors, Vol. 19, pp02528, 2019.
 
[27] M. Yadollahzadeh Tabari; Z. Mataji, Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol, journal of AI and Data Mining, Volume 9, Issue 1 , January 2021, , Pages73-85.
 
[28] L. khalvati; M. Keshtgary; N. Rikhtegar, Intrusion Detection based on a Novel Hybrid Learning Approach, journal of AI and Data Mining, Volume 6, Issue 1 , March 2018, , Pages 157-162, doi.org/10.22044/jadm.2017.979 .
 
[29] M. Rahimi, A. A. Taheri, and H. Mashayekhi, "Learning a Nonlinear Combination of Generalized Heterogeneous Classifiers," Journal of Artificial Intelligence & Data Mining, Vol. 11, No. 1, pp. 77–93, 2023.
 
[30] M. Ahsan, N. Rifat, M. Chowdhury, and R. Gomes, "Intrusion Detection for IoT Network Security with Deep Neural Network," in 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, doi: 10.1109/eit53891.2022.9814006.
 
[31] S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time Intrusion Detection in the Internet of Things," Ad hoc networks, Vol. 11, No. 8, pp. 2661–2674, 2013.
 
[32] C. Ioannou, V. Vassiliou, and C. Sergiou, "An Intrusion Detection System for Wireless Sensor Networks," in 24th International Conference on Telecommunications, ICT 2017, Limassol, Cyprus, May 3-5, 2017, pp. 1-5.
 
[33] C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, "Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things," in Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, June 2015, doi: 10.1109/INM.2015.7140344..
 
[34] E. Kabir, J. Hu, H. Wang, and G. Zhou, "A novel statistical technique for intrusion detection systems," Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, Vol. 79, pp. 303-318, 2018, doi:10.1016/j.future.2017.01.029.