Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Active Learning for Wireless IoT Intrusion Detection

Published: 01 December 2018 Publication History

Abstract

The Internet of Things (IoT) is becoming truly ubiquitous in our everyday lives, but it also faces unique security challenges. Intrusion detection is critical for the security and safety of a wireless IoT network. This article discusses the human-in-theloop active learning approach for wireless intrusion detection. We first present the fundamental challenges against the design of a successful intrusion detection system for a wireless IoT network. We then briefly review the rudimentary concepts of active learning and propose its employment in the diverse applications of wireless intrusion detection. An experimental example is also presented to show the significant performance improvement of the active learning method over the traditional supervised learning approach. While machine learning (ML) techniques have been widely employed for intrusion detection, the application of human-in-the-loop ML that leverages both machine and human intelligence to intrusion detection of IoT is still in its infancy. We hope this article can assist readers in understanding the key concepts of active learning and spur further research in this area.

References

[1]
Y. Cheng, “ A Lightweight Live Memory Forensic Approach Based on Hardware Virtualization,” Info. Sciences, vol. Volume 379, 2016, pp. 23–41.
[2]
Z. Guan, “ Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid,” IEEE Internet of Things J., vol. Volume 4, issue Issue 6, 2017, pp. 1934–44.
[3]
L. Wu, X. Du, and J. Wu, “ Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms,” IEEE Trans. Vehic. Tech., vol. Volume 65, no. Issue 8, 2016, pp. 6678–91.
[4]
K. Yang, “ Deep Network Analyzer (DNA): A Big Data Analytics Platform for Cellular Networks,” IEEE Internet of Things j., vol. Volume 4, no. Issue 6, 2017, pp. 2019–27.
[5]
B. B. Zao, “ A Survey of Intrusion Detection in Internet of Things,” j. Network & Computer Applications, vol. Volume 84, no. Issue C, 2017, pp. 25–37.
[6]
B. Settles, “ Active Learning Literature Survey,” <institution>Univ. Wiscon-sin-Madison</institution>, Comp. Sci. Tech. Rep. 1648, 2009.
[7]
J. P. Amaral, “<chapter-title>Policy and Network-Based Intrusion Detection System for IPv6-Enabled Wireless Sensor Networks</chapter-title>,” IEEE ICC, 2014, pp. 1796–1801.
[8]
D. D. Lewis and W. A. Gale, “ A Sequential Algorithm for Training Text Classifiers,” IntIl. Conf. Computational Linguistics, 1994, pp. 3–12.
[9]
H. S. Seung, M. Opper, and H. Sompolinsky, “<chapter-title>Query by Committee</chapter-title>,” Wksp. computational Learning Theory, 1992, pp. 287–94.
[10]
B. Settles, M. Craven, and S. Ray, “ Multiple-Instance Active Learning,” <conf-name>Conf. Neural Info. Processing Systems</conf-name>, Vancouver, BC, Dec. 2008 pp. 1289–96.
[11]
M. Almgren and E. Jonsson, “<chapter-title>Using Active Learning in Intrusion Detection</chapter-title>,” IEEE Wksp. Computer Security Foundations, 2004, pp. 88–18.
[12]
Y. Li and L. Guo, “ An Active Learning Based TCM-KNN algorithm for Supervised Network Intrusion Detection,” Computers & Security, vol. Volume 26, no. Issue 7, 2007, pp. 459–67.
[13]
N. Gornitz, “<chapter-title>Active Learning for Network Intrusion Detection</chapter-title>,” ACM Wksp. Security and Artificial Intelligence, 2009, pp. 47–54.
[14]
T. Chen and C. Guestrin, “ XGBoost: A Scalable Tree Boosting System,” Proc. 22Nd ACM SICKDD lrit'l. Conf. Knowledge Discovery and Data Mining, ser. KDD'16, 2016, pp. 785–94; {Online}. Available:
[15]
C. Kolias, “ Intrusion Detection in 802. 11 Networks: Empirical Evaluation of Threats and a Public Dataset,” IEEE Commun. Surveys & Tutorials, vol. Volume 18, no. Issue 1, 2016, pp. 184–208.

Cited By

View all
  • (2024)Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacksApplied Soft Computing10.1016/j.asoc.2023.111080150:COnline publication date: 12-Apr-2024
  • (2023)Global Analysis with Aggregation-based Beaconing Detection across Large Campus NetworksProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627126(565-579)Online publication date: 4-Dec-2023
  • (2023)Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321380720:1(684-696)Online publication date: 1-Mar-2023
  • Show More Cited By

Index Terms

  1. Active Learning for Wireless IoT Intrusion Detection
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Wireless Communications
    IEEE Wireless Communications  Volume 25, Issue 6
    December 2018
    126 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 December 2018

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacksApplied Soft Computing10.1016/j.asoc.2023.111080150:COnline publication date: 12-Apr-2024
    • (2023)Global Analysis with Aggregation-based Beaconing Detection across Large Campus NetworksProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627126(565-579)Online publication date: 4-Dec-2023
    • (2023)Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT NetworksIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321380720:1(684-696)Online publication date: 1-Mar-2023
    • (2023)LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5GIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319792120:1(658-671)Online publication date: 1-Mar-2023
    • (2023)AI Empowered Net-RCA for 6GIEEE Network: The Magazine of Global Internetworking10.1109/MNET.130.220035237:6(132-140)Online publication date: 4-Jan-2023
    • (2023)Model update for intrusion detectionComputers and Security10.1016/j.cose.2023.103451134:COnline publication date: 1-Nov-2023
    • (2023)Cellular traffic prediction via deep state space models with attention mechanismComputer Communications10.1016/j.comcom.2022.10.023197:C(276-283)Online publication date: 1-Jan-2023
    • (2022)A deep learning- based frechet and dirichlet model for intrusion detection in IWSNJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-18975642:2(873-883)Online publication date: 1-Jan-2022
    • (2022)Active Sensing for Communications by LearningIEEE Journal on Selected Areas in Communications10.1109/JSAC.2022.315549640:6(1780-1794)Online publication date: 1-Jun-2022
    • (2022)Boosting Cyber-Threat Intelligence via Collaborative Intrusion DetectionFuture Generation Computer Systems10.1016/j.future.2022.04.028135:C(30-43)Online publication date: 1-Oct-2022
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media