Abstract
As widely known, most of the Internet of Things (IoT) devices own small storage and constrained computing power, and hence, their poor security evaluation capabilities make them vulnerable to several types of network attacks. Given this setting, anomaly network traffic detection techniques based on deep learning (DL) offer some practical solutions, and they have brought new opportunities to the security of the IoT. However, existing DL models for anomaly network traffic detection need better flexibility and classification accuracy. Also, the scale of those models needs to be optimized, as a sheer majority of them need to be more suitable for deployment on terminal devices of IoT. Therefore, we propose an anomaly network traffic detection model in this work LMCA, standing for Lightweight Model Integrating adjusted MobileNet and Coordinate Attention mechanism. Combining the adjusted MobileNet model and the coordinate attention mechanism, it constructs a lightweight anomaly network traffic detection model and effectively extracts traffic data's local, global, and spatial–temporal features, which would be easy to deploy on IoT terminals. LMCA has a small scale and good performance, making it suitable for IoT environments. Moreover, we use an original traffic feature extraction method to reduce redundant features and speed up neural network convergence. This work also solves a problem so that the original MobileNet model could perform better on a small dataset, extending the anomaly traffic detection for IoT. To simulate the IoT environment, we used the wired network dataset CICDS2017 and the wireless network dataset AWID. Experimental results demonstrate that the proposed work outperforms other existing methods, the accuracy reached 99.96% on the CICIDS2017 dataset and 99.98% on the AWID dataset.
Similar content being viewed by others
References
Babun, L., Denney, K., Berkay Celik, Z., McDaniel, P., & Selcuk Uluagac, A. (2021). A survey on IoT platforms: Communication, security, and privacy perspectives. Computer Networks, 192, 108040.
Cui, M., Han, D., et al. (2020). ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular Ad-Hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815–15827.
Han, D., Pan, N., et al. (2022). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1), 316–327.
Liang, W., Tang, M., et al. (2019). secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Transactions on Industrial Informatics, 15(6), 3582–3592. https://doi.org/10.1109/TII.2019.2907092
Jun, Z., Chao, C., et al. (2013). Internet traffic classification by aggregating correlated naive bayes predictions. IEEE Transactions on Information Forensics and Security, 8(1), 5–15.
Kemal, O., Baris Can, C., et al. (2021). Imbalance Problems in Object Detection: A Review. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(10), 3388–3415.
Hou Q, Zhou D, Feng J. (2021). Coordinate Attention for Efficient Mobile Network Design. In CVPR arXiv:2103.02907.
Howard, A., Sandler, M., & Chu, G. (2019). Searching for MobileNetV3. In ICCV, pp. 1314–1324.
Sandler, M., Howard, A., Zhu, M. (2018). MobileNetV2: Inverted residuals and linear bottlenecks. In CVPR, pp. 4510–4520.
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel & Distributed Systems, 25(2), 447–456.
Agarwal, A., Sharma, P., Alshehri, M., Mohamed, A. A., & Alfarraj, O. (2021). Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Computer Science, 7(3), e437.
Long, J., Liang, W., et al. (2022). A regularized cross-layer ladder network for intrusion detection in industrial internet-of-things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3204034
Chen, C., Han, D., et al. (2022). CAAN: Context-aware attention network for visual question answering. Pattern Recognition, 132, 108980.
Bi, K., Han, D., et al. (2020). K maximum probability attack paths generation algorithm for target nodes in networked systems. International Journal of Information Security. https://doi.org/10.1007/s10207-020-00517-4
Zhang, W., Han, D., et al. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374.
Zhang, Y., Chen, X., Jin, L., Wang, X. J., & Guo, D. (2019). Network intrusion detection: Based on deep hierarchical network and original flow data. IEEE Access, 7, 37004–37016.
Zhang, Y., Chen, X., Guo, D., Song, M., Teng, Y. L., & Wang, X. J. (2019). PCCN: Parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access, 7, 119904–119916.
He, J., Han, D., et al. (2020). On one-time cookies protocol based on one-time password. Soft Computing, 24, 5657–5670. https://doi.org/10.1007/s00500-019-04138-5
Zhang, X., Wang, J., & Zhu, S. (2022). Dual generative adversarial networks based unknown encryption ransomware attack detection. IEEE Access, 10, 900–913.
Shaokang, C., Dezhi, H., & Dun, L. (2022). A feedback semi-supervised learning with meta-gradient for intrusion detection. IEEE Systems Journal, 17(1), 1158–69.
Roy, S., Li, J., Choi, B.-J., & Bai, Y. (2022). A lightweight supervised intrusion detection mechanism for IoT networks. Future Generation Computer Systems, 127, 276–285.
Basati, A., & Faghih, M. M. (2022). DFE: Efficient IoT network intrusion detection using deep feature extraction. Neural Computing and Applications, 34(18), 15175–15195.
Alghanam, O. A., Almobaideen, W., Saadeh, M., & Adwan, O. (2023). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications, 213, 118745.
Sayed, N., Shoaib, M., Ahmed, W., Qasem, S. N., Albarrak, A. M., & Saeed, F. (2023). Augmenting IoT intrusion detection system performance using deep neural network. CMC-Computers Materials & Continua, 74(1), 1351–1374.
Yang, J., Fang, B., & Zhai, L. (2012). Research on security model of universal control system for internet of things. Journal of Communications, 33(11), 8. (in Chinese).
Liang, W., Xie, S., et al. (2022). A mutual security authentication method for RFID-PUF circuit based on deep learning. ACM Transactions on Internet Technology, 22(2), 34. https://doi.org/10.1145/3426968
Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016). Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. Communications surveys tutorials, 18(1), 184–208.
Lei, S., Xia, C., Li, Z., Li, X., & Wang, T. (2021). HNN: A novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis. IEEE Transactions on Network Science and Engineering, 8(4), 3257–3274.
Zhou, S., Li, X. (2021). Spiking neural networks with single-spike temporal-coded neurons for network intrusion detection, in: International conference on pattern recognition, pp 8148–8155.
Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access, 7, 38597–38607.
Chen, X., Liang, W., et al. (2021). An efficient service recommendation algorithm for cyber-physical-social systems. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2021.3092204
Liang, W., Yang, Y., et al. (2022). PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability. https://doi.org/10.1109/TR.2022.3190932
Hongzhi, L., Dezhi, H., & Mingdong, T. (2022). A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE Internet of Thing Journal, 9(6), 4704–4720.
Li, D., Han, D., Zheng, Z., Weng, T.-H., Li, H., Liu, H., Castiglione, A., & Li, K.-C. (2022). MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning. Computer Standards & Interfaces, 81(103597), 1–10.
Li, D., Han, D., Weng, T.-H., Zheng, Z., Li, H., Liu, H., Castiglione, A., & Li, K.-C. (2022). Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing, 26, 4423–4440.
Funding
The article was funded by National Natural Science Foundation of China, under the Grant Nos. (61672338) and (61672338).
Author information
Authors and Affiliations
Contributions
HZ Methodology, Writing Original draft preparation, Software; ZW Conceptualization, Methodology, Writing Original draft preparation, Software, Resources, Supervision; BH Methodology, Data curation, Resources, Validation; HZ Methodology, Data curation, Validation, Writing, Reviewing and Editing; TW and KL: Methodology, Validation, Visualization, Supervision, Writing, Reviewing and Editing; AKP: Writing, Reviewing and Editing.
Corresponding author
Ethics declarations
Conflcit of interest
The authors declare that they have no conflcit of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Han, D., Zhou, H., Weng, TH. et al. LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT. Telecommun Syst 84, 549–564 (2023). https://doi.org/10.1007/s11235-023-01059-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-023-01059-5