Skip to main content
Log in

LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

As widely known, most of the Internet of Things (IoT) devices own small storage and constrained computing power, and hence, their poor security evaluation capabilities make them vulnerable to several types of network attacks. Given this setting, anomaly network traffic detection techniques based on deep learning (DL) offer some practical solutions, and they have brought new opportunities to the security of the IoT. However, existing DL models for anomaly network traffic detection need better flexibility and classification accuracy. Also, the scale of those models needs to be optimized, as a sheer majority of them need to be more suitable for deployment on terminal devices of IoT. Therefore, we propose an anomaly network traffic detection model in this work LMCA, standing for Lightweight Model Integrating adjusted MobileNet and Coordinate Attention mechanism. Combining the adjusted MobileNet model and the coordinate attention mechanism, it constructs a lightweight anomaly network traffic detection model and effectively extracts traffic data's local, global, and spatial–temporal features, which would be easy to deploy on IoT terminals. LMCA has a small scale and good performance, making it suitable for IoT environments. Moreover, we use an original traffic feature extraction method to reduce redundant features and speed up neural network convergence. This work also solves a problem so that the original MobileNet model could perform better on a small dataset, extending the anomaly traffic detection for IoT. To simulate the IoT environment, we used the wired network dataset CICDS2017 and the wireless network dataset AWID. Experimental results demonstrate that the proposed work outperforms other existing methods, the accuracy reached 99.96% on the CICIDS2017 dataset and 99.98% on the AWID dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Babun, L., Denney, K., Berkay Celik, Z., McDaniel, P., & Selcuk Uluagac, A. (2021). A survey on IoT platforms: Communication, security, and privacy perspectives. Computer Networks, 192, 108040.

    Article  Google Scholar 

  2. Cui, M., Han, D., et al. (2020). ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular Ad-Hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815–15827.

    Article  Google Scholar 

  3. Han, D., Pan, N., et al. (2022). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1), 316–327.

    Article  Google Scholar 

  4. Liang, W., Tang, M., et al. (2019). secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Transactions on Industrial Informatics, 15(6), 3582–3592. https://doi.org/10.1109/TII.2019.2907092

    Article  Google Scholar 

  5. Jun, Z., Chao, C., et al. (2013). Internet traffic classification by aggregating correlated naive bayes predictions. IEEE Transactions on Information Forensics and Security, 8(1), 5–15.

    Article  Google Scholar 

  6. Kemal, O., Baris Can, C., et al. (2021). Imbalance Problems in Object Detection: A Review. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(10), 3388–3415.

    Article  Google Scholar 

  7. Hou Q, Zhou D, Feng J. (2021). Coordinate Attention for Efficient Mobile Network Design. In CVPR arXiv:2103.02907.

  8. Howard, A., Sandler, M., & Chu, G. (2019). Searching for MobileNetV3. In ICCV, pp. 1314–1324.

  9. Sandler, M., Howard, A., Zhu, M. (2018). MobileNetV2: Inverted residuals and linear bottlenecks. In CVPR, pp. 4510–4520.

  10. Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel & Distributed Systems, 25(2), 447–456.

    Article  Google Scholar 

  11. Agarwal, A., Sharma, P., Alshehri, M., Mohamed, A. A., & Alfarraj, O. (2021). Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Computer Science, 7(3), e437.

    Article  Google Scholar 

  12. Long, J., Liang, W., et al. (2022). A regularized cross-layer ladder network for intrusion detection in industrial internet-of-things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3204034

    Article  Google Scholar 

  13. Chen, C., Han, D., et al. (2022). CAAN: Context-aware attention network for visual question answering. Pattern Recognition, 132, 108980.

    Article  Google Scholar 

  14. Bi, K., Han, D., et al. (2020). K maximum probability attack paths generation algorithm for target nodes in networked systems. International Journal of Information Security. https://doi.org/10.1007/s10207-020-00517-4

    Article  Google Scholar 

  15. Zhang, W., Han, D., et al. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374.

    Article  Google Scholar 

  16. Zhang, Y., Chen, X., Jin, L., Wang, X. J., & Guo, D. (2019). Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 7, 37004–37016.

    Article  Google Scholar 

  17. Zhang, Y., Chen, X., Guo, D., Song, M., Teng, Y. L., & Wang, X. J. (2019). PCCN: Parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access, 7, 119904–119916.

    Article  Google Scholar 

  18. He, J., Han, D., et al. (2020). On one-time cookies protocol based on one-time password. Soft Computing, 24, 5657–5670. https://doi.org/10.1007/s00500-019-04138-5

    Article  Google Scholar 

  19. Zhang, X., Wang, J., & Zhu, S. (2022). Dual generative adversarial networks based unknown encryption ransomware attack detection. IEEE Access, 10, 900–913.

    Article  Google Scholar 

  20. Shaokang, C., Dezhi, H., & Dun, L. (2022). A feedback semi-supervised learning with meta-gradient for intrusion detection. IEEE Systems Journal, 17(1), 1158–69.

    Google Scholar 

  21. Roy, S., Li, J., Choi, B.-J., & Bai, Y. (2022). A lightweight supervised intrusion detection mechanism for IoT networks. Future Generation Computer Systems, 127, 276–285.

    Article  Google Scholar 

  22. Basati, A., & Faghih, M. M. (2022). DFE: Efficient IoT network intrusion detection using deep feature extraction. Neural Computing and Applications, 34(18), 15175–15195.

    Article  Google Scholar 

  23. Alghanam, O. A., Almobaideen, W., Saadeh, M., & Adwan, O. (2023). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications, 213, 118745.

    Article  Google Scholar 

  24. Sayed, N., Shoaib, M., Ahmed, W., Qasem, S. N., Albarrak, A. M., & Saeed, F. (2023). Augmenting IoT intrusion detection system performance using deep neural network. CMC-Computers Materials & Continua, 74(1), 1351–1374.

    Article  Google Scholar 

  25. Yang, J., Fang, B., & Zhai, L. (2012). Research on security model of universal control system for internet of things. Journal of Communications, 33(11), 8. (in Chinese).

    Google Scholar 

  26. Liang, W., Xie, S., et al. (2022). A mutual security authentication method for RFID-PUF circuit based on deep learning. ACM Transactions on Internet Technology, 22(2), 34. https://doi.org/10.1145/3426968

    Article  Google Scholar 

  27. Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016). Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. Communications surveys tutorials, 18(1), 184–208.

    Article  Google Scholar 

  28. Lei, S., Xia, C., Li, Z., Li, X., & Wang, T. (2021). HNN: A novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis. IEEE Transactions on Network Science and Engineering, 8(4), 3257–3274.

    Article  Google Scholar 

  29. Zhou, S., Li, X. (2021). Spiking neural networks with single-spike temporal-coded neurons for network intrusion detection, in: International conference on pattern recognition, pp 8148–8155.

  30. Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access, 7, 38597–38607.

    Article  Google Scholar 

  31. Chen, X., Liang, W., et al. (2021). An efficient service recommendation algorithm for cyber-physical-social systems. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2021.3092204

    Article  Google Scholar 

  32. Liang, W., Yang, Y., et al. (2022). PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability. https://doi.org/10.1109/TR.2022.3190932

    Article  Google Scholar 

  33. Hongzhi, L., Dezhi, H., & Mingdong, T. (2022). A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE Internet of Thing Journal, 9(6), 4704–4720.

    Article  Google Scholar 

  34. Li, D., Han, D., Zheng, Z., Weng, T.-H., Li, H., Liu, H., Castiglione, A., & Li, K.-C. (2022). MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning. Computer Standards & Interfaces, 81(103597), 1–10.

    Google Scholar 

  35. Li, D., Han, D., Weng, T.-H., Zheng, Z., Li, H., Liu, H., Castiglione, A., & Li, K.-C. (2022). Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing, 26, 4423–4440.

    Article  Google Scholar 

Download references

Funding

The article was funded by National Natural Science Foundation of China, under the Grant Nos. (61672338) and (61672338).

Author information

Authors and Affiliations

Authors

Contributions

HZ Methodology, Writing Original draft preparation, Software; ZW Conceptualization, Methodology, Writing Original draft preparation, Software, Resources, Supervision; BH Methodology, Data curation, Resources, Validation; HZ Methodology, Data curation, Validation, Writing, Reviewing and Editing; TW and KL: Methodology, Validation, Visualization, Supervision, Writing, Reviewing and Editing; AKP: Writing, Reviewing and Editing.

Corresponding author

Correspondence to Tien-Hsiung Weng.

Ethics declarations

Conflcit of interest

The authors declare that they have no conflcit of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, D., Zhou, H., Weng, TH. et al. LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT. Telecommun Syst 84, 549–564 (2023). https://doi.org/10.1007/s11235-023-01059-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-023-01059-5

Keywords

Navigation