基于深度学习的NB-IoT拒绝睡眠攻击检测

Tahani Bani-Yaseen, A. Tahat, K. Kastell, T. Edwan
{"title":"基于深度学习的NB-IoT拒绝睡眠攻击检测","authors":"Tahani Bani-Yaseen, A. Tahat, K. Kastell, T. Edwan","doi":"10.18080/jtde.v10n3.532","DOIUrl":null,"url":null,"abstract":"With increasing Internet-of-Things (IoT) protocols and connectivity, a growing number of attacks are emerging in the associated networks. This work presents approaches using deep learning (DL) to detect attacks in an IoT environment, particularly in narrowband Internet-of-Things (NB-IoT). By virtue of its low cost, low complexity and limited energy, an NB-IoT device will not likely permit cutting-edge security mechanisms, leaving it vulnerable to, for example, denial-of-sleep (DoSl) attacks. For performance analysis, a NB-IoT network was simulated, using ns-3, to generate a novel dataset to represent an implementation of DoSl attacks. After preprocessing, the dataset was presented to a collection of machine learning (ML) models to evaluate their performance. The considered DL recurrent neural network (RNN) models have proven capable of reliably classifying traffic, with very high accuracy, into either a DoSl attack or a normal record. The performance of a long short-term memory (LSTM) classifier has provided accuracies up to 98.99%, with a detection time of 2.54 x 10-5 second/record, surpassing performance of a gated recurrent unit (GRU). RNN DL models have superior performance in terms of accuracy of detecting DoSl attacks in NB-IoT networks, when compared with other ML algorithms, including support vector machine, Gaussian naïve-Bayes, and logistic regression. ","PeriodicalId":37752,"journal":{"name":"Australian Journal of Telecommunications and the Digital Economy","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Denial-of-Sleep Attack Detection in NB-IoT Using Deep Learning\",\"authors\":\"Tahani Bani-Yaseen, A. Tahat, K. Kastell, T. Edwan\",\"doi\":\"10.18080/jtde.v10n3.532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With increasing Internet-of-Things (IoT) protocols and connectivity, a growing number of attacks are emerging in the associated networks. This work presents approaches using deep learning (DL) to detect attacks in an IoT environment, particularly in narrowband Internet-of-Things (NB-IoT). By virtue of its low cost, low complexity and limited energy, an NB-IoT device will not likely permit cutting-edge security mechanisms, leaving it vulnerable to, for example, denial-of-sleep (DoSl) attacks. For performance analysis, a NB-IoT network was simulated, using ns-3, to generate a novel dataset to represent an implementation of DoSl attacks. After preprocessing, the dataset was presented to a collection of machine learning (ML) models to evaluate their performance. The considered DL recurrent neural network (RNN) models have proven capable of reliably classifying traffic, with very high accuracy, into either a DoSl attack or a normal record. The performance of a long short-term memory (LSTM) classifier has provided accuracies up to 98.99%, with a detection time of 2.54 x 10-5 second/record, surpassing performance of a gated recurrent unit (GRU). RNN DL models have superior performance in terms of accuracy of detecting DoSl attacks in NB-IoT networks, when compared with other ML algorithms, including support vector machine, Gaussian naïve-Bayes, and logistic regression. \",\"PeriodicalId\":37752,\"journal\":{\"name\":\"Australian Journal of Telecommunications and the Digital Economy\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Australian Journal of Telecommunications and the Digital Economy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18080/jtde.v10n3.532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Australian Journal of Telecommunications and the Digital Economy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18080/jtde.v10n3.532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 2

摘要

随着物联网(IoT)协议和连接性的增加,越来越多的攻击出现在相关网络中。这项工作提出了使用深度学习(DL)来检测物联网环境中的攻击的方法,特别是在窄带物联网(NB-IoT)中。由于其低成本,低复杂性和有限的能源,NB-IoT设备不太可能支持尖端的安全机制,使其容易受到拒绝睡眠(DoSl)攻击等攻击。为了进行性能分析,我们使用ns-3模拟了一个NB-IoT网络,生成了一个新的数据集来表示ddos攻击的实现。预处理后,将数据集呈现给机器学习(ML)模型集合以评估其性能。所考虑的DL递归神经网络(RNN)模型已被证明能够以非常高的准确率可靠地将流量分类为ddos攻击或正常记录。长短期记忆(LSTM)分类器的准确率高达98.99%,检测时间为2.54 x 10-5秒/条记录,超过了门控循环单元(GRU)的性能。与其他ML算法(包括支持向量机、高斯naïve-Bayes和逻辑回归)相比,RNN深度学习模型在检测NB-IoT网络中ddos攻击的准确性方面具有优越的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Denial-of-Sleep Attack Detection in NB-IoT Using Deep Learning
With increasing Internet-of-Things (IoT) protocols and connectivity, a growing number of attacks are emerging in the associated networks. This work presents approaches using deep learning (DL) to detect attacks in an IoT environment, particularly in narrowband Internet-of-Things (NB-IoT). By virtue of its low cost, low complexity and limited energy, an NB-IoT device will not likely permit cutting-edge security mechanisms, leaving it vulnerable to, for example, denial-of-sleep (DoSl) attacks. For performance analysis, a NB-IoT network was simulated, using ns-3, to generate a novel dataset to represent an implementation of DoSl attacks. After preprocessing, the dataset was presented to a collection of machine learning (ML) models to evaluate their performance. The considered DL recurrent neural network (RNN) models have proven capable of reliably classifying traffic, with very high accuracy, into either a DoSl attack or a normal record. The performance of a long short-term memory (LSTM) classifier has provided accuracies up to 98.99%, with a detection time of 2.54 x 10-5 second/record, surpassing performance of a gated recurrent unit (GRU). RNN DL models have superior performance in terms of accuracy of detecting DoSl attacks in NB-IoT networks, when compared with other ML algorithms, including support vector machine, Gaussian naïve-Bayes, and logistic regression. 
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.60
自引率
0.00%
发文量
37
期刊介绍: The Journal of Telecommunications and the Digital Economy (JTDE) is an international, open-access, high quality, peer reviewed journal, indexed by Scopus and Google Scholar, covering innovative research and practice in Telecommunications, Digital Economy and Applications. The mission of JTDE is to further through publication the objective of advancing learning, knowledge and research worldwide. The JTDE publishes peer reviewed papers that may take the following form: *Research Paper - a paper making an original contribution to engineering knowledge. *Special Interest Paper – a report on significant aspects of a major or notable project. *Review Paper for specialists – an overview of a relevant area intended for specialists in the field covered. *Review Paper for non-specialists – an overview of a relevant area suitable for a reader with an electrical/electronics background. *Public Policy Discussion - a paper that identifies or discusses public policy and includes investigation of legislation, regulation and what is happening around the world including best practice *Tutorial Paper – a paper that explains an important subject or clarifies the approach to an area of design or investigation. *Technical Note – a technical note or letter to the Editors that is not sufficiently developed or extensive in scope to constitute a full paper. *Industry Case Study - a paper that provides details of industry practices utilising a case study to provide an understanding of what is occurring and how the outcomes have been achieved. *Discussion – a contribution to discuss a published paper to which the original author''s response will be sought. Historical - a paper covering a historical topic related to telecommunications or the digital economy.
期刊最新文献
Blockchain Technology for Tourism Post COVID-19 ICT-driven Transparency: Empirical Evidence from Selected Asian Countries Big Data Analytics in Tracking COVID-19 Spread Utilizing Google Location Data Harry S. Wragge AM (1929-2023) Phishing Message Detection Based on Keyword Matching
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1