使用遥测数据进行IoT/IIoT网络攻击检测的深度迁移学习方法

IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Neural Network World Pub Date : 2023-01-01 DOI:10.14311/nnw.2023.33.014
S. Poonkuzhal, M. Shobana, J. Jeyalakshmi
{"title":"使用遥测数据进行IoT/IIoT网络攻击检测的深度迁移学习方法","authors":"S. Poonkuzhal, M. Shobana, J. Jeyalakshmi","doi":"10.14311/nnw.2023.33.014","DOIUrl":null,"url":null,"abstract":"The rise of internet connectivity across the globe increases the count of IoT (internet of things)/IIoT (industrial internet of things) devices exponentially. The objects/devices which are connected to the internet are always prone to malicious attacks at various levels, such as physical, network, fog, and applications, which exist in the IoT architecture. Many researchers have addressed this issue and designed their own solutions based on machine and deep learning techniques. It is undeniable that deep learning outperforms machine learning (ML), but it necessitates a massive amount of datasets with appropriate labels. In this work, the deep transfer learning (TL) technique has been adapted for gated recurrent unit (GRU). Each model is trained using a dataset that belongs to one source IoT device (source domain), and this trained model is used to classify the malicious traffic in another dataset that belongs to some other IoT device (target domain). This approach is used for binary classification. These transfer learning models have been evaluated using an IoT/IIoT telemetry dataset called ToN IoT which comprises the sensor data generated from the seven different types of IoT devices. The highest accuracy achieved by IoT garage door was upto 99.76% as a source domain by fixing IoT thermostat as target domain. These models were also evaluated using some more metrics such as precision, recall, F1-measure, training time and testing time. By implementing transfer learning based GRU model, the accuracy of the model is improved from 69.20% to 99.76%. Moreover, to prove the efficiency of the proposed model, it is compared with state of art deep learning model and its results were analyzed in a detailed manner.","PeriodicalId":49765,"journal":{"name":"Neural Network World","volume":"25 1","pages":"0"},"PeriodicalIF":0.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A deep transfer learning approach for IoT/IIoT cyber attack detection using telemetry data\",\"authors\":\"S. Poonkuzhal, M. Shobana, J. Jeyalakshmi\",\"doi\":\"10.14311/nnw.2023.33.014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rise of internet connectivity across the globe increases the count of IoT (internet of things)/IIoT (industrial internet of things) devices exponentially. The objects/devices which are connected to the internet are always prone to malicious attacks at various levels, such as physical, network, fog, and applications, which exist in the IoT architecture. Many researchers have addressed this issue and designed their own solutions based on machine and deep learning techniques. It is undeniable that deep learning outperforms machine learning (ML), but it necessitates a massive amount of datasets with appropriate labels. In this work, the deep transfer learning (TL) technique has been adapted for gated recurrent unit (GRU). Each model is trained using a dataset that belongs to one source IoT device (source domain), and this trained model is used to classify the malicious traffic in another dataset that belongs to some other IoT device (target domain). This approach is used for binary classification. These transfer learning models have been evaluated using an IoT/IIoT telemetry dataset called ToN IoT which comprises the sensor data generated from the seven different types of IoT devices. The highest accuracy achieved by IoT garage door was upto 99.76% as a source domain by fixing IoT thermostat as target domain. These models were also evaluated using some more metrics such as precision, recall, F1-measure, training time and testing time. By implementing transfer learning based GRU model, the accuracy of the model is improved from 69.20% to 99.76%. Moreover, to prove the efficiency of the proposed model, it is compared with state of art deep learning model and its results were analyzed in a detailed manner.\",\"PeriodicalId\":49765,\"journal\":{\"name\":\"Neural Network World\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Neural Network World\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14311/nnw.2023.33.014\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Neural Network World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14311/nnw.2023.33.014","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

全球互联网连接的兴起使IoT(物联网)/IIoT(工业物联网)设备的数量呈指数增长。连接到互联网的对象/设备总是容易受到各种层面的恶意攻击,例如物联网架构中存在的物理,网络,雾和应用程序。许多研究人员已经解决了这个问题,并基于机器和深度学习技术设计了自己的解决方案。不可否认,深度学习优于机器学习(ML),但它需要大量带有适当标签的数据集。在这项工作中,深度迁移学习(TL)技术已适用于门控循环单元(GRU)。每个模型都使用属于一个源物联网设备(源域)的数据集进行训练,并且该训练模型用于对属于其他物联网设备(目标域)的另一个数据集中的恶意流量进行分类。这种方法用于二值分类。这些迁移学习模型已经使用名为ToN IoT的物联网/工业物联网遥测数据集进行了评估,该数据集包括从七种不同类型的物联网设备生成的传感器数据。通过将物联网恒温器固定为目标域,物联网车库门作为源域的准确率最高可达99.76%。这些模型还使用精度、召回率、f1测量、训练时间和测试时间等其他指标进行评估。通过实现基于迁移学习的GRU模型,将模型的准确率从69.20%提高到99.76%。此外,为了证明该模型的有效性,将其与目前最先进的深度学习模型进行了比较,并对其结果进行了详细的分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A deep transfer learning approach for IoT/IIoT cyber attack detection using telemetry data
The rise of internet connectivity across the globe increases the count of IoT (internet of things)/IIoT (industrial internet of things) devices exponentially. The objects/devices which are connected to the internet are always prone to malicious attacks at various levels, such as physical, network, fog, and applications, which exist in the IoT architecture. Many researchers have addressed this issue and designed their own solutions based on machine and deep learning techniques. It is undeniable that deep learning outperforms machine learning (ML), but it necessitates a massive amount of datasets with appropriate labels. In this work, the deep transfer learning (TL) technique has been adapted for gated recurrent unit (GRU). Each model is trained using a dataset that belongs to one source IoT device (source domain), and this trained model is used to classify the malicious traffic in another dataset that belongs to some other IoT device (target domain). This approach is used for binary classification. These transfer learning models have been evaluated using an IoT/IIoT telemetry dataset called ToN IoT which comprises the sensor data generated from the seven different types of IoT devices. The highest accuracy achieved by IoT garage door was upto 99.76% as a source domain by fixing IoT thermostat as target domain. These models were also evaluated using some more metrics such as precision, recall, F1-measure, training time and testing time. By implementing transfer learning based GRU model, the accuracy of the model is improved from 69.20% to 99.76%. Moreover, to prove the efficiency of the proposed model, it is compared with state of art deep learning model and its results were analyzed in a detailed manner.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Neural Network World
Neural Network World 工程技术-计算机:人工智能
CiteScore
1.80
自引率
0.00%
发文量
0
审稿时长
12 months
期刊介绍: Neural Network World is a bimonthly journal providing the latest developments in the field of informatics with attention mainly devoted to the problems of: brain science, theory and applications of neural networks (both artificial and natural), fuzzy-neural systems, methods and applications of evolutionary algorithms, methods of parallel and mass-parallel computing, problems of soft-computing, methods of artificial intelligence.
期刊最新文献
Water quality image classification for aquaculture using deep transfer learning Enhanced QOS energy-efficient routing algorithm using deep belief neural network in hybrid falcon-improved ACO nature-inspired optimization in wireless sensor networks Vibration analyses of railway systems using proposed neural predictors A self-adaptive deep learning-based model to predict cloud workload Integration of railway infrastructure topological description elements from the microL2 to the macroN0,L0 level of detail
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1