Skip to main content

2024 | OriginalPaper | Buchkapitel

Deep Learning-Based Solution for Intrusion Detection in the Internet of Things

verfasst von : Akhil Chaurasia, Alok Mishra, Udai Pratap Rao, Alok Kumar

Erschienen in: Computational Intelligence and Network Systems

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing the Internet of Things-based environment is a top priority for consumers, businesses, and governments. There are billions of devices connecting and sharing data; an attack might cost billions of dollars. As a result, it’s important to protect the IoT network from external and internal threats. There is no way to guarantee that all vulnerabilities will be fixed with a single solution or that no additional flaws will be discovered. This paper proposes a deep learning-based solution to detect network intrusion in an IoT network to better prepare for network attacks. The proposed solution achieves the optimal tradeoff between accuracy and model weightage and ensures it is well-suited for resource-constrained IoT devices. The proposed solution uses a reduced data set for training produced by incremental PCA with LSTM, GRU, and BiLSTM. The proposed solution reduced the training time significantly while retaining the accuracy of 98.17% with GRU, 98.12% with LSTM, and 98.23% with BiLSTM, and the results show that the proposed model has better performance in training the model for detecting network intrusion in an IoT network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimedia Tools Appli. 80(16), 24147–24171 (2021)CrossRef Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimedia Tools Appli. 80(16), 24147–24171 (2021)CrossRef
3.
Zurück zum Zitat ElSayed, M.S., Le-Khac, N.A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021)CrossRef ElSayed, M.S., Le-Khac, N.A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021)CrossRef
5.
Zurück zum Zitat Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.N., Bayne, E., Bellekens, X.: Utilising deep learning techniques for effective zero-day attack detection. Electronics 9(10), 1684 (2020)CrossRef Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.N., Bayne, E., Bellekens, X.: Utilising deep learning techniques for effective zero-day attack detection. Electronics 9(10), 1684 (2020)CrossRef
6.
Zurück zum Zitat Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)CrossRef Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)CrossRef
7.
Zurück zum Zitat Joshi, C., Ranjan, R.K., Bharti, V.: A fuzzy logic based feature engineering approach for botnet detection using ann. J. King Saud University-Comput. Informat. Sci. (2021) Joshi, C., Ranjan, R.K., Bharti, V.: A fuzzy logic based feature engineering approach for botnet detection using ann. J. King Saud University-Comput. Informat. Sci. (2021)
9.
Zurück zum Zitat Krimmling, J., Peter, S.: Integration and evaluation of intrusion detection for coap in smart city applications. In: 2014 IEEE Conference on Communications and Network Security, pp. 73–78. IEEE (2014) Krimmling, J., Peter, S.: Integration and evaluation of intrusion detection for coap in smart city applications. In: 2014 IEEE Conference on Communications and Network Security, pp. 73–78. IEEE (2014)
10.
Zurück zum Zitat Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (lstm). J. Big Data 8(1), 1–16 (2021)CrossRef Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (lstm). J. Big Data 8(1), 1–16 (2021)CrossRef
12.
Zurück zum Zitat Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)CrossRef Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)CrossRef
14.
Zurück zum Zitat Pooja, T., Shrinivasacharya, P.: Evaluating neural networks using bi-directional lstm for network ids (intrusion detection systems) in cyber security. Global Trans. Proc. 2(2), 448–454 (2021)CrossRef Pooja, T., Shrinivasacharya, P.: Evaluating neural networks using bi-directional lstm for network ids (intrusion detection systems) in cyber security. Global Trans. Proc. 2(2), 448–454 (2021)CrossRef
15.
Zurück zum Zitat Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using cnn. Soft. Comput. 24(22), 17265–17278 (2020)CrossRef Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using cnn. Soft. Comput. 24(22), 17265–17278 (2020)CrossRef
16.
Zurück zum Zitat Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)CrossRef Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)CrossRef
18.
21.
Zurück zum Zitat Zhao, J.W., et al.: Method of choosing optimal features used to intrusion detection system in coal mine disaster warning internet of things based on immunity algorithm. Vet. Clin. Pathol: A Case-Based Approach, 157 (2015) Zhao, J.W., et al.: Method of choosing optimal features used to intrusion detection system in coal mine disaster warning internet of things based on immunity algorithm. Vet. Clin. Pathol: A Case-Based Approach, 157 (2015)
Metadaten
Titel
Deep Learning-Based Solution for Intrusion Detection in the Internet of Things
verfasst von
Akhil Chaurasia
Alok Mishra
Udai Pratap Rao
Alok Kumar
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-48984-6_7

Premium Partner