IoT Threat Mitigation: Leveraging Deep Learning for Intrusion Detection

Main Article Content

Dr. Ch. Suresh Babu
Boppa Sri Satya Sai Hruday
Jonnala Veera Venkata Sai Krishna
Chellinki Sandeep
Boddu Naveen

Abstract

The growth of smart gadgets connected via the Internet of Things (IoT) in today’s modern technology landscape has substantially improved our everyday lives. However, this convenience is juxtaposed with a concomitant surge in cyber threats capable of compromising the integrity of these interconnected systems. Conventional intrusion detection systems (IDS) prove inadequate for IoT due to the unique challenges they present. We propose and evaluate an intrusion detection system (IDS) based on a hybrid Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) model in this paper. The model is designed to capture both temporal and spatial patterns in network data, offering a robust solution for detecting malicious activities within IoT environments. The CNN-LSTM model displayed excellent accuracy, reaching 98% in both multi-class and binary classifications when trained on the UNSW-NB15 dataset. Furthermore, we explore the real-world applicability of the model through testing on Raspberry Pi, showcasing its effectiveness in IoT scenarios. The system is augmented with alert mechanisms, promptly notifying relevant parties upon intrusion detection. Our findings highlight the CNN-LSTM model's efficacy in strengthening IoT network security.

Downloads

Download data is not yet available.

Article Details

How to Cite
Dr. Ch. Suresh Babu, Boppa Sri Satya Sai Hruday, Jonnala Veera Venkata Sai Krishna, Chellinki Sandeep, & Boddu Naveen. (2024). IoT Threat Mitigation: Leveraging Deep Learning for Intrusion Detection. Journal of Advanced Zoology, 45(3), 801–810. https://doi.org/10.53555/jaz.v45i3.4132
Section
Articles
Author Biographies

Dr. Ch. Suresh Babu

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

 

Boppa Sri Satya Sai Hruday

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Jonnala Veera Venkata Sai Krishna

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Chellinki Sandeep

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Boddu Naveen

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

References

Moustafa, N., & Slayman, M. S. (2006). Machine learning methods for network intrusion detection: A comparative analysis. Journal of Network and Computer Applications, 30(1), 36-56.

Ma, Junfeng, and Sung-Bae Cho. "Anomaly detection for wireless sensor networks using a one-class support vector machine." International Journal of Distributed Sensor Networks 10.4 (2014): 159415.

Chandola, Varun, Arindam Banerjee, and Vipin Kumar. "Anomaly detection: A survey." ACM computing surveys (CSUR) 41.3 (2009): 1-58.

Kumar, S., & Spafford, E. H. (1994). A pattern matching model for misuse intrusion detection. Proceedings of the 17th National Computer Security Conference, 11-21.

Guyon, I., & Elisseeff, A. (2003). Random forests for network intrusion detection. Proceedings of the 3rd IEEE Symposium on Computational Intelligence for Security and Defense Applications, 30-37.

Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2), 18-28.

Zhang, L., Gu, G., & Rong, L. (2017). Anomaly detection in network traffic using long short-term memory networks. IEEE Transactions on Network and Service Management, 64(10), 1444-1455.

S. Hanif, T. Ilyas, M. Zeeshan, Intrusion detection in iot using artificial neural networks on unswnb15 dataset, IEEE 16th International Conference Smart Cities, Improving Quality of Life Using ICT & IoT AI (HONET-ICT) (2019) 152 156.

Li, M., Li, J., Wang, C., Wang, Y., & Guo, S. (2023). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 23(19), 11055.

Khan, M. A., Cheema, M. A., Bashir, M. K., & Hussain, S. (2022). Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach. arXiv preprint arXiv:2204.04837.

N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).,” In Proc. IEEE Military Commun. Inf. Syst. Conf. (MilCIS), pp. 1-6, 2015.