IoT Threat Mitigation: Leveraging Deep Learning for Intrusion Detection

Authors

  • Dr. Ch. Suresh Babu
  • Boppa Sri Satya Sai Hruday
  • Jonnala Veera Venkata Sai Krishna
  • Chellinki Sandeep
  • Boddu Naveen

DOI:

https://doi.org/10.53555/jaz.v45i3.4132

Keywords:

Intrusion Detection, IOT, IOT Security, Deep Learning, Alert Mechanism, Network Data Analysis, Cybersecurity

Abstract

The growth of smart gadgets connected via the Internet of Things (IoT) in today’s modern technology landscape has substantially improved our everyday lives. However, this convenience is juxtaposed with a concomitant surge in cyber threats capable of compromising the integrity of these interconnected systems. Conventional intrusion detection systems (IDS) prove inadequate for IoT due to the unique challenges they present. We propose and evaluate an intrusion detection system (IDS) based on a hybrid Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) model in this paper. The model is designed to capture both temporal and spatial patterns in network data, offering a robust solution for detecting malicious activities within IoT environments. The CNN-LSTM model displayed excellent accuracy, reaching 98% in both multi-class and binary classifications when trained on the UNSW-NB15 dataset. Furthermore, we explore the real-world applicability of the model through testing on Raspberry Pi, showcasing its effectiveness in IoT scenarios. The system is augmented with alert mechanisms, promptly notifying relevant parties upon intrusion detection. Our findings highlight the CNN-LSTM model's efficacy in strengthening IoT network security.

Downloads

Download data is not yet available.

Author Biographies

Dr. Ch. Suresh Babu

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

 

Boppa Sri Satya Sai Hruday

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Jonnala Veera Venkata Sai Krishna

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Chellinki Sandeep

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

Boddu Naveen

Dept. of IT, SR Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh-521356

References

Moustafa, N., & Slayman, M. S. (2006). Machine learning methods for network intrusion detection: A comparative analysis. Journal of Network and Computer Applications, 30(1), 36-56.

Ma, Junfeng, and Sung-Bae Cho. "Anomaly detection for wireless sensor networks using a one-class support vector machine." International Journal of Distributed Sensor Networks 10.4 (2014): 159415.

Chandola, Varun, Arindam Banerjee, and Vipin Kumar. "Anomaly detection: A survey." ACM computing surveys (CSUR) 41.3 (2009): 1-58.

Kumar, S., & Spafford, E. H. (1994). A pattern matching model for misuse intrusion detection. Proceedings of the 17th National Computer Security Conference, 11-21.

Guyon, I., & Elisseeff, A. (2003). Random forests for network intrusion detection. Proceedings of the 3rd IEEE Symposium on Computational Intelligence for Security and Defense Applications, 30-37.

Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2), 18-28.

Zhang, L., Gu, G., & Rong, L. (2017). Anomaly detection in network traffic using long short-term memory networks. IEEE Transactions on Network and Service Management, 64(10), 1444-1455.

S. Hanif, T. Ilyas, M. Zeeshan, Intrusion detection in iot using artificial neural networks on unswnb15 dataset, IEEE 16th International Conference Smart Cities, Improving Quality of Life Using ICT & IoT AI (HONET-ICT) (2019) 152 156.

Li, M., Li, J., Wang, C., Wang, Y., & Guo, S. (2023). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 23(19), 11055.

Khan, M. A., Cheema, M. A., Bashir, M. K., & Hussain, S. (2022). Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach. arXiv preprint arXiv:2204.04837.

N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).,” In Proc. IEEE Military Commun. Inf. Syst. Conf. (MilCIS), pp. 1-6, 2015.

Downloads

Published

2024-03-27

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.