Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3421766.3421891acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiamConference Proceedingsconference-collections
research-article

Deep Learning for IoT Intrusion Detection based on LSTMs-AE

Published: 26 October 2020 Publication History
  • Get Citation Alerts
  • Abstract

    With the advent of 5G era, The Internet of Things (IoT) is obtaining considerable attention in all walks of life nowadays. However, due to the hardware problems of devices, there may exists some security problems in IOT. While existing intrusion detection methods rarely consider the time series feature of the data. In this paper, we propose an anomaly monitoring model for Autoencoder based on Long-Short Term Memory (LSTMs-AE), in which LTSM is exploited to capture time-series features and the intrusion detection is performed by the feature learning ability of Autoencoder. Thorough experiments demonstrate that our model has better intrusion detection performance than ordinary Autoencoder, as in most of the dataset the accuracy rate of proposed scheme exceeds 0.95.

    References

    [1]
    Y. Meidan et al., "N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders," IEEE Pervasive Comput., vol. 17, no. 3, pp. 12--22, May 2018.
    [2]
    D. Midi, A. Rullo, A. Mudgerikar, and E. Bertino, "Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things," Proc. - Int. Conf. Distrib. Comput. Syst., pp. 656--666, 2017.
    [3]
    S. Dong and B. Zhang, "Network Traffic Anomaly Detection Method Based on Deep Features Learning," Dianzi Yu Xinxi Xuebao/Journal Electron. Inf. Technol., vol. 42, no. 3, pp. 695--703, March 2020.
    [4]
    P. Park, P. Di Marco, H. Shin, and J. Bang, "Fault detection and diagnosis using combined autoencoder and long short-term memory network," Sensors (Switzerland), vol. 19, no. 21, pp. 1--17, October 2019
    [5]
    D. Park, Y. Hoshi, and C. C. Kemp, "A Multimodal Anomaly Detector for Robot-Assisted Feeding Using an LSTM-Based Variational Autoencode," IEEE Robot. Autom. Lett., vol. 3, no. 3, pp. 1544--1551, November 2018.
    [6]
    M. Ahmed, A. Naser Mahmood, and J. Hu, "A survey of network anomaly detection techniques," J. Netw. Comput. Appl., vol. 60, pp. 19--31, October 2016.
    [7]
    A. Drewek-Ossowicka, M. Pietrołaj, and J. Rumiński, "A survey of neural networks usage for intrusion detection systems," J. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020.
    [8]
    H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey," Appl. Sci., vol. 9, no. 20, October 2019.
    [9]
    W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, "A new intrusion detection system based on KNN classification algorithm in wireless sensor network," J. Electr. Comput. Eng., vol. 2014, no. 1, May 2014.
    [10]
    S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, "High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning," Pattern Recognit., vol. 58, pp. 121--134, April 2016.
    [11]
    B. Zong et al., "Deep autoencoding Gaussian mixture model for unsupervised anomaly detection," 6th Int. Conf. Learn. Represent. ICLR 2018 - Conf. Track Proc., pp. 1--19, 2018.
    [12]
    C. Syms, "Principal components analysis," Encycl. Ecol., pp. 566--573, 2018.
    [13]
    Y. Yang, K. Zheng, C. Wu, and Y. Yang, "Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network," Sensors (Switzerland), vol. 19, no. 11, June 2019.
    [14]
    I. Sutskever, O. Vinyals, and Q. V. Le, "Sequence to sequence learning with neural networks," in Advances in Neural Information Processing Systems, 2014, vol. 4, no. January, pp. 3104--3112.
    [15]
    J. Kim, J. Kim, H. L. T. Thu, and H. Kim, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection," 2016 Int. Conf. Platf. Technol. Serv. PlatCon 2016 -- Proc., 2016".
    [16]
    P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff, "LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection," in Presented at ICML 2016 Anomaly Detection Workshop, New York, NY, Jul. 2016. [Online]. Available: https://arxiv.org/abs/1607.00148.
    [17]
    S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Comput., vol. 9, no. 8, pp. 1735--1780, September 1997.
    [18]
    M. Sakurada and T. Yairi, "Anomaly detection using autoencoders with nonlinear dimensionality reduction," in ACM International Conference Proceeding Series, 2014, vol. 02-Decembe, pp. 4--11.
    [19]
    Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," no. February, pp. 18--21, 2018.
    [20]
    R. Yao, C. Liu, L. Zhang, and P. Peng, "Unsupervised anomaly detection using variational auto-encoder based feature extraction," in 2019 IEEE International Conference on Prognostics and Health Management, ICPHM 2019, 2019, no. September, pp. 1--7.
    [21]
    Y. Xie and Y. Zhang, "An intelligent anomaly analysis for intrusion detection based on SVM," Proc. - 2012 Int. Conf. Comput. Sci. Inf. Process. CSIP 2012, pp. 739--742, 2012.
    [22]
    L. Kuang and M. Zulkemine, "An anomaly intrusion detection method using the CSI-KNN algorithm," Proc. ACM Symp. Appl. Comput., pp. 921--926, 2008.

    Cited By

    View all
    • (2024)Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of thingsInternational Journal of Information Security10.1007/s10207-024-00855-7Online publication date: 30-Apr-2024
    • (2022)Generative Deep Learning to Detect Cyberattacks for the IoT-23 DatasetIEEE Access10.1109/ACCESS.2021.314001510(6430-6441)Online publication date: 2022
    • (2021)Application of Deep Learning for Quality of Service Enhancement in Internet of Things: A ReviewEnergies10.3390/en1419638414:19(6384)Online publication date: 6-Oct-2021
    • Show More Cited By

    Index Terms

    1. Deep Learning for IoT Intrusion Detection based on LSTMs-AE

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      AIAM2020: Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture
      October 2020
      566 pages
      ISBN:9781450375535
      DOI:10.1145/3421766
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 October 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Deep learning
      2. Intrusion detection
      3. IoT security
      4. LSTMs-AE

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      AIAM2020

      Acceptance Rates

      AIAM2020 Paper Acceptance Rate 100 of 285 submissions, 35%;
      Overall Acceptance Rate 100 of 285 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)23
      • Downloads (Last 6 weeks)2

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of thingsInternational Journal of Information Security10.1007/s10207-024-00855-7Online publication date: 30-Apr-2024
      • (2022)Generative Deep Learning to Detect Cyberattacks for the IoT-23 DatasetIEEE Access10.1109/ACCESS.2021.314001510(6430-6441)Online publication date: 2022
      • (2021)Application of Deep Learning for Quality of Service Enhancement in Internet of Things: A ReviewEnergies10.3390/en1419638414:19(6384)Online publication date: 6-Oct-2021
      • (2021)A Network Traffic Classification Method Based on Graph Convolution and LSTMIEEE Access10.1109/ACCESS.2021.31281819(158261-158272)Online publication date: 2021

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media