Affiliation:
1. Department of Computer Science and Engineering, Dongguk University, Seoul 04620, Republic of Korea
2. Department of Biomedical Sciences, Korea University College of Medicine, Seoul 02841, Republic of Korea
Abstract
Networks within the Internet of Things (IoT) have some of the most targeted devices due to their lightweight design and the sensitive data exchanged through smart city networks. One way to protect a system from an attack is to use machine learning (ML)-based intrusion detection systems (IDSs), significantly improving classification tasks. Training ML algorithms require a large network traffic dataset; however, large storage and months of recording are required to capture the attacks, which is costly for IoT environments. This study proposes an ML pipeline using the conditional tabular generative adversarial network (CTGAN) model to generate a synthetic dataset. Then, the synthetic dataset was evaluated using several types of statistical and ML metrics. Using a decision tree, the accuracy of the generated dataset reached 0.99, and its lower complexity reached 0.05 s training and 0.004 s test times. The results show that synthetic data accurately reflect real data and are less complex, making them suitable for IoT environments and smart city applications. Thus, the generated synthetic dataset can further train models to secure IoT networks and applications.
Funder
National Research Foundation of Korea
MSIT
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference52 articles.
1. A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code;Jeong;Future Gener. Comput. Syst.,2019
2. Son, Y., Jeong, J., and Lee, Y. (2018). An Adaptive Offloading Method for an IoT-Cloud Converged Virtual Machine System Using a Hybrid Deep Neural Network. Sustainability, 10.
3. Secure Cloud Storage Service Using Bloom Filters for the Internet of Things;Jeong;Access,2019
4. Advanced persistent threat organization identification based on software gene of malware;Chen;Eur. Trans. Telecommun.,2020
5. Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning;Cheng;Secur. Commun. Netw.,2021
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献