Javascript must be enabled to continue!
Intelligent Feature Engineering Based Intrusion Detection System for IoT Network Security
View through CrossRef
Abstract
Internet-of-Things (IoT) helps create smart systems by allowing physical environments to be controlled or monitored by users through extensive sensor networks. Such networks are heavily resource constrained due to the low processing power and decentralized placement of sensors. Having been implemented in several backbone sectors such as industry, healthcare, etc, they often deal with sensitive information. Thus, there is an imminent need to secure IoT networks using lightweight intrusion detection systems. To this end, existing works that use BiLSTM for network intrusion detection are explored. Experiments involving the UNSW-NB15 dataset are recreated, and the results are compared. Early stopping is implemented to improve model performance and enable better analysis of the results. Finally, a novel machine learning and feature engineering-based intelligent network intrusion detection framework, dubbed FEIIDS, is proposed. Its working is explained in depth and its time complexity is analyzed. It is tested on the UNSW-NB15 dataset and found to be competitive with existing works, achieving classification accuracies up to 98.8%. Discussions on the results reveal that FEIIDS is more stable, transparent, and lightweight than deep learning models. In fact, FEIIDS can process 2,032,038 records of the dataset in 280.44 seconds, whereas BiLSTM requires 1901.2 seconds to process just 14,000 records. A case study on FEIIDS’s real-world application is also presented. Finally, it is concluded that FEIIDS is highly suitable for use as a real-time intrusion detection system in resource-constrained IoT networks, and its possible future applications are listed.
Title: Intelligent Feature Engineering Based Intrusion
Detection System for IoT Network Security
Description:
Abstract
Internet-of-Things (IoT) helps create smart systems by allowing physical environments to be controlled or monitored by users through extensive sensor networks.
Such networks are heavily resource constrained due to the low processing power and decentralized placement of sensors.
Having been implemented in several backbone sectors such as industry, healthcare, etc, they often deal with sensitive information.
Thus, there is an imminent need to secure IoT networks using lightweight intrusion detection systems.
To this end, existing works that use BiLSTM for network intrusion detection are explored.
Experiments involving the UNSW-NB15 dataset are recreated, and the results are compared.
Early stopping is implemented to improve model performance and enable better analysis of the results.
Finally, a novel machine learning and feature engineering-based intelligent network intrusion detection framework, dubbed FEIIDS, is proposed.
Its working is explained in depth and its time complexity is analyzed.
It is tested on the UNSW-NB15 dataset and found to be competitive with existing works, achieving classification accuracies up to 98.
8%.
Discussions on the results reveal that FEIIDS is more stable, transparent, and lightweight than deep learning models.
In fact, FEIIDS can process 2,032,038 records of the dataset in 280.
44 seconds, whereas BiLSTM requires 1901.
2 seconds to process just 14,000 records.
A case study on FEIIDS’s real-world application is also presented.
Finally, it is concluded that FEIIDS is highly suitable for use as a real-time intrusion detection system in resource-constrained IoT networks, and its possible future applications are listed.
Related Results
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
Abstract
Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant mon...
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
AbstractThe continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information technology and the Inte...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermed...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...

