scispace - formally typeset
Open AccessJournal ArticleDOI

Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks

Imtiaz Ullah, +1 more
- 01 Jul 2021 - 
- Vol. 9, pp 103906-103926
TLDR
In this article, a novel anomaly-based IDS (Intrusion Detection System) using machine learning techniques to detect and classify attacks in IoT networks is proposed, where a convolutional neural network model is used to create a multiclass classification model.
Abstract
The growing development of IoT (Internet of Things) devices creates a large attack surface for cybercriminals to conduct potentially more destructive cyberattacks; as a result, the security industry has seen an exponential increase in cyber-attacks. Many of these attacks have effectively accomplished their malicious goals because intruders conduct cyber-attacks using novel and innovative techniques. An anomaly-based IDS (Intrusion Detection System) uses machine learning techniques to detect and classify attacks in IoT networks. In the presence of unpredictable network technologies and various intrusion methods, traditional machine learning techniques appear inefficient. In many research areas, deep learning methods have shown their ability to identify anomalies accurately. Convolutional neural networks are an excellent alternative for anomaly detection and classification due to their ability to automatically categorize main characteristics in input data and their effectiveness in performing faster computations. In this paper, we design and develop a novel anomaly-based intrusion detection model for IoT networks. First, a convolutional neural network model is used to create a multiclass classification model. The proposed model is then implemented using convolutional neural networks in 1D, 2D, and 3D. The proposed convolutional neural network model is validated using the BoT-IoT, IoT Network Intrusion, MQTT-IoT-IDS2020, and IoT-23 intrusion detection datasets. Transfer learning is used to implement binary and multiclass classification using a convolutional neural network multiclass pre-trained model. Our proposed binary and multiclass classification models have achieved high accuracy, precision, recall, and F1 score compared to existing deep learning implementations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework

- 01 Jan 2022 - 
TL;DR: In this paper , the authors proposed a deep learning-driven intrusion detection system (DNNLSTM) for the Internet of Things (IoT), which is capable to encounter a tremendous class of common as well as less frequently occurring cyber threats.
Journal ArticleDOI

Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks

TL;DR: This paper proposes and implements a model for anomaly-based intrusion detection in IoT networks that uses a convolutional neural network (CNN) and gated recurrent unit (GRU) to detect and classify binary and multiclass IoT network data.
Journal ArticleDOI

Cyber Threats Detection in Smart Environments using SDN-enabled DNN-LSTM Hybrid Framework

TL;DR: This scientific study proposes Deep Learning (DL) driven Software Defined Networking (SDN) enabled Intrusion Detection System (IDS) to combat emerging cyber threats in IoT.
Journal ArticleDOI

Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.

TL;DR: In this article, the authors proposed a hybrid intrusion detection system (IDS) based on an embedded model and a convolutional neural network (CNN) for attack detection and classification.
Proceedings ArticleDOI

Machine and Deep Learning Approaches for IoT Attack Classification

TL;DR: This work employs state-of-art traffic classifiers based on deep learning and assess their effectiveness in accomplishing IoT attack classification, aiming to recognize different attack classes and distinguish them from benign network traffic.
References
More filters
Proceedings Article

On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima

TL;DR: In this article, the authors investigate the cause of the generalization drop in the large batch regime and present numerical evidence that supports the view that large-batch methods tend to converge to sharp minima of the training and testing functions.
Journal ArticleDOI

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.
Journal ArticleDOI

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

TL;DR: A survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study to evaluate the efficiency of several methods are presented.
Proceedings ArticleDOI

Characterization of Tor Traffic using Time based Features.

TL;DR: A time analysis on Tor traffic flows is presented, captured between the client and the entry node, to detect the application type: Browsing, Chat, Streaming, Mail, Voip, P2P or File Transfer.
Journal ArticleDOI

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

TL;DR: This survey discusses the role of deep learning in intrusion detection, the impact of intrusion detection datasets, and the efficiency and effectiveness of the proposed approaches, and provides a novel fine-grained taxonomy that categorizes the current state-of-the-art deep learning-based IDSs with respect to different facets.
Related Papers (5)