Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3421766.3421891acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiamConference Proceedingsconference-collections
research-article

Deep Learning for IoT Intrusion Detection based on LSTMs-AE

Published: 26 October 2020 Publication History

Abstract

With the advent of 5G era, The Internet of Things (IoT) is obtaining considerable attention in all walks of life nowadays. However, due to the hardware problems of devices, there may exists some security problems in IOT. While existing intrusion detection methods rarely consider the time series feature of the data. In this paper, we propose an anomaly monitoring model for Autoencoder based on Long-Short Term Memory (LSTMs-AE), in which LTSM is exploited to capture time-series features and the intrusion detection is performed by the feature learning ability of Autoencoder. Thorough experiments demonstrate that our model has better intrusion detection performance than ordinary Autoencoder, as in most of the dataset the accuracy rate of proposed scheme exceeds 0.95.

References

[1]
Y. Meidan et al., "N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders," IEEE Pervasive Comput., vol. 17, no. 3, pp. 12--22, May 2018.
[2]
D. Midi, A. Rullo, A. Mudgerikar, and E. Bertino, "Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things," Proc. - Int. Conf. Distrib. Comput. Syst., pp. 656--666, 2017.
[3]
S. Dong and B. Zhang, "Network Traffic Anomaly Detection Method Based on Deep Features Learning," Dianzi Yu Xinxi Xuebao/Journal Electron. Inf. Technol., vol. 42, no. 3, pp. 695--703, March 2020.
[4]
P. Park, P. Di Marco, H. Shin, and J. Bang, "Fault detection and diagnosis using combined autoencoder and long short-term memory network," Sensors (Switzerland), vol. 19, no. 21, pp. 1--17, October 2019
[5]
D. Park, Y. Hoshi, and C. C. Kemp, "A Multimodal Anomaly Detector for Robot-Assisted Feeding Using an LSTM-Based Variational Autoencode," IEEE Robot. Autom. Lett., vol. 3, no. 3, pp. 1544--1551, November 2018.
[6]
M. Ahmed, A. Naser Mahmood, and J. Hu, "A survey of network anomaly detection techniques," J. Netw. Comput. Appl., vol. 60, pp. 19--31, October 2016.
[7]
A. Drewek-Ossowicka, M. Pietrołaj, and J. Rumiński, "A survey of neural networks usage for intrusion detection systems," J. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020.
[8]
H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey," Appl. Sci., vol. 9, no. 20, October 2019.
[9]
W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, "A new intrusion detection system based on KNN classification algorithm in wireless sensor network," J. Electr. Comput. Eng., vol. 2014, no. 1, May 2014.
[10]
S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, "High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning," Pattern Recognit., vol. 58, pp. 121--134, April 2016.
[11]
B. Zong et al., "Deep autoencoding Gaussian mixture model for unsupervised anomaly detection," 6th Int. Conf. Learn. Represent. ICLR 2018 - Conf. Track Proc., pp. 1--19, 2018.
[12]
C. Syms, "Principal components analysis," Encycl. Ecol., pp. 566--573, 2018.
[13]
Y. Yang, K. Zheng, C. Wu, and Y. Yang, "Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network," Sensors (Switzerland), vol. 19, no. 11, June 2019.
[14]
I. Sutskever, O. Vinyals, and Q. V. Le, "Sequence to sequence learning with neural networks," in Advances in Neural Information Processing Systems, 2014, vol. 4, no. January, pp. 3104--3112.
[15]
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection," 2016 Int. Conf. Platf. Technol. Serv. PlatCon 2016 -- Proc., 2016".
[16]
P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, "LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection," in Presented at ICML 2016 Anomaly Detection Workshop, New York, NY, Jul. 2016. [Online]. Available: https://arxiv.org/abs/1607.00148.
[17]
S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Comput., vol. 9, no. 8, pp. 1735--1780, September 1997.
[18]
M. Sakurada and T. Yairi, "Anomaly detection using autoencoders with nonlinear dimensionality reduction," in ACM International Conference Proceeding Series, 2014, vol. 02-Decembe, pp. 4--11.
[19]
Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," no. February, pp. 18--21, 2018.
[20]
R. Yao, C. Liu, L. Zhang, and P. Peng, "Unsupervised anomaly detection using variational auto-encoder based feature extraction," in 2019 IEEE International Conference on Prognostics and Health Management, ICPHM 2019, 2019, no. September, pp. 1--7.
[21]
Y. Xie and Y. Zhang, "An intelligent anomaly analysis for intrusion detection based on SVM," Proc. - 2012 Int. Conf. Comput. Sci. Inf. Process. CSIP 2012, pp. 739--742, 2012.
[22]
L. Kuang and M. Zulkemine, "An anomaly intrusion detection method using the CSI-KNN algorithm," Proc. ACM Symp. Appl. Comput., pp. 921--926, 2008.

Cited By

View all
  • (2024)Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of thingsInternational Journal of Information Security10.1007/s10207-024-00855-723:4(2559-2581)Online publication date: 30-Apr-2024
  • (2023)A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information FusionProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3615214(4455-4459)Online publication date: 21-Oct-2023
  • (2022)Generative Deep Learning to Detect Cyberattacks for the IoT-23 DatasetIEEE Access10.1109/ACCESS.2021.314001510(6430-6441)Online publication date: 2022
  • Show More Cited By

Index Terms

  1. Deep Learning for IoT Intrusion Detection based on LSTMs-AE

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AIAM2020: Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture
    October 2020
    566 pages
    ISBN:9781450375535
    DOI:10.1145/3421766
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Deep learning
    2. Intrusion detection
    3. IoT security
    4. LSTMs-AE

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AIAM2020

    Acceptance Rates

    AIAM2020 Paper Acceptance Rate 100 of 285 submissions, 35%;
    Overall Acceptance Rate 100 of 285 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 01 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of thingsInternational Journal of Information Security10.1007/s10207-024-00855-723:4(2559-2581)Online publication date: 30-Apr-2024
    • (2023)A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information FusionProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3615214(4455-4459)Online publication date: 21-Oct-2023
    • (2022)Generative Deep Learning to Detect Cyberattacks for the IoT-23 DatasetIEEE Access10.1109/ACCESS.2021.314001510(6430-6441)Online publication date: 2022
    • (2021)Application of Deep Learning for Quality of Service Enhancement in Internet of Things: A ReviewEnergies10.3390/en1419638414:19(6384)Online publication date: 6-Oct-2021
    • (2021)A Network Traffic Classification Method Based on Graph Convolution and LSTMIEEE Access10.1109/ACCESS.2021.31281819(158261-158272)Online publication date: 2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media