Affiliation:
1. Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia
2. College of Computer and Information Sciences (CCIS), King Saud University, Saudi Arabia
Abstract
In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data traffic that feed big data analytics, which could be used in discovering unseen patterns and identifying anomalous traffic. In this paper, we identify five key design principles that should be considered when developing a deep learning-based intrusion detection system (IDS) for the IoT. Based on these principles, we design and implement Temporal Convolution Neural Network (TCNN), a deep learning framework for intrusion detection systems in IoT, which combines Convolution Neural Network (CNN) with causal convolution. TCNN is combined with Synthetic Minority Oversampling Technique-Nominal Continuous (SMOTE-NC) to handle unbalanced dataset. It is also combined with efficient feature engineering techniques, which consist of feature space reduction and feature transformation. TCNN is evaluated on Bot-IoT dataset and compared with two common machine learning algorithms, i.e., Logistic Regression (LR) and Random Forest (RF), and two deep learning techniques, i.e., LSTM and CNN. Experimental results show that TCNN achieves a good trade-off between effectiveness and efficiency. It outperforms the state-of-the-art deep learning IDSs that are tested on Bot-IoT dataset and records an accuracy of 99.9986% for multiclass traffic detection, and shows a very close performance to CNN with respect to the training time.
Funder
Deanship of Scientific Research, King Saud University
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference61 articles.
1. Security in the internet of things: recent challenges and solutions;H. Belkhiri
2. Palo alto networks2020 unit 42 iot threat report2020, https://unit42.paloaltonetworks.com/iot-threat-report-2020/
3. Understanding the mirai botnet;M. Antonakakis
4. Researchers discover iot botnet capable of launching various ddos attacks;S. Fadilpasic
5. New malware family assembles iot botnet;J. Vijayan
Cited by
76 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献