Skip to main content
Log in

Feature engineering and deep learning-based intrusion detection framework for securing edge IoT

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Devices belonging to the realm of edge Internet of Things (IoT) are becoming highly susceptible to intrusion attacks. The large-scale development in edge IoT, ease of availability, and affordability have drastically increased its usage in the real world. The business market revolves around producing better, innovative, and appealing products every day. However, security is often left unchecked to achieve these standards. Therefore, vulnerabilities present in these devices make them susceptible to various intrusion attacks. We devised a model named DF-IDS for detecting intrusions in IoT traffic. DF-IDS consists of two main phases: In the \(1^{st}\) phase, it comparatively selects the best features from the feature matrix using SpiderMonkey (SM), principle component analysis (PCA), information gain (IG), and correlation attribute evaluation (CAE). In the \(2^{nd}\) phase, these features along with assigned labels are used to train a deep neural network for intrusion detection. DF-IDS achieves an accuracy of 99.23% with an F1-score of 99.27%. It shows improvement not only in accuracy but also in F1 score as compared to the other comparative models and existing studies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. https://www.gsma.com/newsroom/press-release/new-gsma-study-operators-must-look-beyond-connectivity-to-increase-share/.

  2. https://portswigger.net/daily-swig/realtek-sdk-vulnerabilities-impact-dozens-of-downstream-iot-vendors.

  3. https://www.imperva.com/blog/malware-analysis-mirai-ddos-botnet/.

  4. https://securityintelligence.com/posts/internet-of-threats-iot-botnets-network-attacks/.

  5. theguardian.com/technology/2020/aug/26/new-zealand-stock-exchange-hit-by-cyber-attack-for-second-day.

  6. https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657.

  7. https://www.unb.ca/cic/datasets/nsl.html.

References

  1. Otoum Y, Liu D, Nayak A (2019) Dl-ids: a deep learning-based intrusion detection framework for securing iot. Trans Emerg Telecommun Technol 6:e3803

    Google Scholar 

  2. Iwendi C, Rehman SU, Javed AR, Khan S, Srivastava G (2021) Sustainable security for the internet of things using artificial intelligence architectures. ACM Trans Internet Technol (TOIT) 21(3):1–22

    Article  Google Scholar 

  3. Patel KK, Patel SM et al (2016) Internet of things-iot: definition, characteristics, architecture, enabling technologies, application & future challenges. Int J Eng Sci Comput 6(5):517

    Google Scholar 

  4. Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2021) Secure cloud storage for medical iot data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst 21:1–13

    Google Scholar 

  5. Jamali MAJ, Bahrami B, Heidari A, Allahverdizadeh P, Norouzi F (2020) Iot architecture. In: Towards the Internet of Things, Springer, pp 9–31

  6. Bhanu K, Mahadevaswamy H, Jasmine H (2020) Iot based smart system for enhanced irrigation in agriculture. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, pp 760–765

  7. Mendonça RV, Teodoro AA, Rosa RL, Saadi M, Melgarejo DC, Nardelli PH, Rodríguez DZ (2021) Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9:61024–61034

    Article  Google Scholar 

  8. Ahmed W, Rasool A, Javed AR, Kumar N, Gadekallu TR, Jalil Z, Kryvinska N (2021) Security in next generation mobile payment systems: A comprehensive survey. IEEE Access 9:115932–115950. https://doi.org/10.1109/ACCESS.2021.3105450

    Article  Google Scholar 

  9. Ran Z, Zheng D, Lai Y, Tian L (2020) Applying stack bidirectional lstm model to intrusion detection. CMC-Computers Mater Continua 65(1):309–320

    Article  Google Scholar 

  10. ur Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, Jalil Z, Bashir AK (2021) Diddos: an approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Fut Gener Computer Syst 118:453–466

    Article  Google Scholar 

  11. Imtiaz SI, ur Rehman S, Javed AR, Jalil Z, Liu X, Alnumay WS (2021) Deepamd: detection and identification of android malware using high-efficient deep artificial neural network. Fut Gener Computer Syst 115:844–856

    Article  Google Scholar 

  12. Hina M, Ali M, Javed AR, Ghabban F, Khan LA, Jalil Z (2021) Sefaced: semantic-based forensic analysis and classification of e-mail data using deep learning. IEEE Access 9:98398–98411

    Article  Google Scholar 

  13. Mythili R, Kalpana P (2020) High speed network intrusion detection system (nids) using low power precomputation based content addressable memory. Computers, Mater Continua 62(3):1097–1107

    Article  Google Scholar 

  14. Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2021) A comprehensive survey of ai-enabled phishing attacks detection techniques. Telecommun Syst 76(1):139–154

    Article  Google Scholar 

  15. Mittal M, Iwendi C, Khan S, Rehman Javed A (2021) Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using levenberg-marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol 32(6):e3997

    Google Scholar 

  16. Muhammad A, Asad M, Javed AR (2020) Robust early stage botnet detection using machine learning. In: 2020 International Conference on Cyber Warfare and Security (ICCWS), IEEE, pp 1–6

  17. Basit A, Zafar M, Javed AR, Jalil Z (2020) A novel ensemble machine learning method to detect phishing attack. In: 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE, pp 1–5

  18. Ahmed W, Shahzad F, Javed AR, Iqbal F, Ali L (2021) Whatsapp network forensics: Discovering the ip addresses of suspects. 2021 11th IFIP International Conference on New Technologies. Mobility and Security (NTMS), IEEE, pp 1–7

  19. Kannadiga P, Zulkernine M (2005) Didma: A distributed intrusion detection system using mobile agents. In: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network, IEEE, pp 238–245

  20. Afzal S, Asim M, Javed AR, Beg MO, Baker T (2021) Urldeepdetect: a deep learning approach for detecting malicious urls using semantic vector models. J Netw Syst Manage 29(3):1–27

    Article  Google Scholar 

  21. Javed AR, Rehman SU, Khan MU, Alazab M, Khan HU (2021) Betalogger: smartphone sensor-based side-channel attack detection and text inference using language modeling and dense multilayer neural network. Trans Asian Low-Resour Lang Inf Process 20(5):1–17

    Article  Google Scholar 

  22. Rehman Javed A, Jalil Z, Atif Moqurrab S, Abbas S, Liu X (2020) Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Transactions on Emerging Telecommunications Technologies p e4088

  23. Javed AR, Beg MO, Asim M, Baker T, Al-Bayatti AH (2020) Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes. Journal of Ambient Intelligence and Humanized Computing pp 1–14

  24. Zhou Y, Han M, Liu L, He JS, Wang Y (2018) Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp 262–267

  25. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Fut Gener Computer Syst 82:761–768

    Article  Google Scholar 

  26. Andresini G, Appice A, Malerba D (2021) Autoencoder-based deep metric learning for network intrusion detection. Inf Sci 569:706–727

    Article  MathSciNet  Google Scholar 

  27. Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on svm with feature augmentation. Knowl-Based Syst 136:130–139

    Article  Google Scholar 

  28. Zhang Y, Li P, Wang X (2019) Intrusion detection for iot based on improved genetic algorithm and deep belief network. IEEE Access 7:31711–31722

    Article  Google Scholar 

  29. Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru. IEEE Transactions on Network Science and Engineering

  30. Javed AR, Usman M, Rehman SU, Khan MU, Haghighi MS (2020) Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Transactions on Intelligent Transportation Systems

  31. Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2020) Deepdetect: detection of distributed denial of service attacks using deep learning. Computer J 63:983–994

    Article  Google Scholar 

  32. HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Fut Gener Computer Syst 85:88–96

    Article  Google Scholar 

  33. McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: 2018 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Rehman Javed.

Ethics declarations

Conflict of interest

The authors share no conflict of interests.

Data availability

Data sources are highlighted in the paper.

Code availability

The authors can provide the code on demand.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nasir, M., Javed, A.R., Tariq, M.A. et al. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J Supercomput 78, 8852–8866 (2022). https://doi.org/10.1007/s11227-021-04250-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04250-0

Keywords

Navigation