Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Strengthening Network Intrusion Detection in IoT Environments with Self-supervised Learning and Few Shot Learning

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2024)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14811))

Included in the following conference series:

  • 157 Accesses

Abstract

The Internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects, enabling high levels of connectivity between them. As the IoT networks grow and expand, they become more susceptible to cybersecurity attacks. A significant challenge in current intrusion detection systems for IoT includes handling imbalanced datasets where labeled data are scarce, particularly for new and rare types of cyber attacks. Existing literature often fails to detect such underrepresented attack classes. This paper introduces a novel intrusion detection approach designed to address these challenges. By integrating Self Supervised Learning (SSL), Few Shot Learning (FSL), and Random Forest (RF), our approach excels in learning from limited and imbalanced data and enhancing detection capabilities. The approach starts with a Deep Infomax model trained to extract key features from the dataset. These features are then fed into a prototypical network to generate discriminate embedding. Subsequently, an RF classifier is employed to detect and classify potential malware, including a range of attacks that are frequently observed in IoT networks. The proposed approach was evaluated through two different datasets, MaleVis and WSN-DS, which demonstrate its superior performance with accuracies of 98.60% and 99.56%, precisions of 98.79% and 99.56%, recalls of 98.60% and 99.56%, and F1-scores of 98.63% and 99.56%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Malevis dataset. https://web.cs.hacettepe.edu.tr/~selman/malevis/. Accessed 23 Jan 2024

  2. Almomani, I., Al-Kasasbeh, B., Al-Akhras, M., et al.: Wsn-ds: a dataset for intrusion detection systems in wireless sensor networks. J. Sensors 2016 (2016)

    Google Scholar 

  3. Atitallah, S.B., Driss, M., Almomani, I.: A novel detection and multi-classification approach for iot-malware using random forest voting of fine-tuning convolutional neural networks. Sensors 22(11), 4302 (2022)

    Article  Google Scholar 

  4. Atitallah, S.B., Driss, M., Boulila, W., Ghézala, H.B.: Leveraging deep learning and iot big data analytics to support the smart cities development: Review and future directions. Comput. Sci. Rev. 38, 100303 (2020)

    Article  Google Scholar 

  5. Atitallah, S.B., Driss, M., Ghezala, H.B.: Fedmicro-ida: a federated learning and microservices-based framework for iot data analytics. Internet of Things 23, 100845 (2023)

    Article  Google Scholar 

  6. Ayesha S, D., AB, S.: Fs3: Few-shot and self-supervised framework for efficient intrusion detection in internet of things networks. In: Proceedings of the 39th Annual Computer Security Applications Conference, pp. 138–149 (2023)

    Google Scholar 

  7. Ben Atitallah, S., Driss, M., Boulila, W., Almomani, I.: An effective detection and classification approach for dos attacks in wireless sensor networks using deep transfer learning models and majority voting. In: Bădică, C., Treur, J., Benslimane, D., Hnatkowska, B., Krótkiewicz, M. (eds.) Advances in Computational Collective Intelligence: 14th International Conference, ICCCI 2022, Hammamet, Tunisia, September 28–30, 2022, Proceedings, pp. 180–192. Springer International Publishing, Cham (2022). https://doi.org/10.1007/978-3-031-16210-7_14

    Chapter  Google Scholar 

  8. Ericsson, L., Gouk, H., Loy, C.C., Hospedales, T.M.: Self-supervised representation learning: Introduction, advances, and challenges. IEEE Signal Process. Mag. 39(3), 42–62 (2022)

    Article  Google Scholar 

  9. Hjelm, R.D., et al.: Learning deep representations by mutual information estimation and maximization. arXiv preprint arXiv:1808.06670 (2018)

  10. Jaiswal, A., Babu, A.R., Zadeh, M.Z., Banerjee, D., Makedon, F.: A survey on contrastive self-supervised learning. Technologies 9(1), 2 (2020)

    Article  Google Scholar 

  11. Latif, S., Boulila, W., Koubaa, A., Zou, Z., Ahmad, J.: Dtl-ids: an optimized intrusion detection framework using deep transfer learning and genetic algorithm. J. Netw. Comput. Appl. 221, 103784 (2024)

    Article  Google Scholar 

  12. Lee, I.: Internet of things (iot) cybersecurity: Literature review and iot cyber risk management. Future Internet 12(9), 157 (2020)

    Article  Google Scholar 

  13. Liu, X., et al.: Self-supervised learning: generative or contrastive. IEEE Trans. Knowl. Data Eng. 35(1), 857–876 (2021)

    Google Scholar 

  14. Snell, J., Swersky, K., Zemel, R.: Prototypical networks for few-shot learning. In: Advances in Neural Information Processing Systems, vol. 30 (2017)

    Google Scholar 

  15. Ullah, S., et al.: Tnn-ids: transformer neural network-based intrusion detection system for mqtt-enabled iot networks. Comput. Netw. 237, 110072 (2023)

    Article  Google Scholar 

  16. Wang, Y., Yao, Q., Kwok, J.T., Ni, L.M.: Generalizing from a few examples: a survey on few-shot learning. ACM Comput. Surv. (csur) 53(3), 1–34 (2020)

    Article  Google Scholar 

  17. Xiao, Y., Jin, Y., Hao, K.: Adaptive prototypical networks with label words and joint representation learning for few-shot relation classification. IEEE Transactions on Neural Networks and Learning Systems (2021)

    Google Scholar 

  18. Yu, Y., Bian, N.: An intrusion detection method using few-shot learning. IEEE Access 8, 49730–49740 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to thank Prince Sultan University for financially supporting the conference registration fees.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Safa Ben Atitallah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ben Atitallah, S., Driss, M., Boulila, W., Koubaa, A. (2024). Strengthening Network Intrusion Detection in IoT Environments with Self-supervised Learning and Few Shot Learning. In: Nguyen, N.T., et al. Computational Collective Intelligence. ICCCI 2024. Lecture Notes in Computer Science(), vol 14811. Springer, Cham. https://doi.org/10.1007/978-3-031-70819-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-70819-0_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-70818-3

  • Online ISBN: 978-3-031-70819-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics