skip to main content
10.1145/3293614.3293642acmotherconferencesArticle/Chapter ViewAbstractPublication Pageseatis-orgConference Proceedingsconference-collections
short-paper

Intrusion Detection via Multilayer Perceptron using a Low Power Device

Published: 12 November 2018 Publication History

Abstract

This work investigates the use of Multi-layered Perceptron Networks (MLP) for attack detection, using the Arduino embedded system as a case study. This paper also investigates techniques to reduce the computational cost of ANN (Artificial Neural Networks), taking into account the low cost and low consumption requirements in order to ensure the feasibility of its implementation. As a result, we evaluated the MLP networks using metrics such as accuracy, precision, and coverage, as well as the classifier performance running on Arduino through time measurements (microseconds).

References

[1]
Morteza Amini, Rasool Jalili, and Hamid Reza Shahriari. 2006. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security 25, 6 (2006), 459--468.
[2]
Atmel Corporation 2016. ATmega328/P. Atmel Corporation, San Jose, CA, EUA. https://www.microchip.com/
[3]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15 (2010), 2787--2805.
[4]
V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos. 2011. Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset. Expert Systems with Applications 38, 5 (2011), 5947--5957.
[5]
Frans Botes, Louise Leenen, and Retha De La Harpe. 2017. Ant Colony Induced Decision Trees for Intrusion Detection. In 16th European Conference on Cyber Warfare and Security. ACPI, 53--62.
[6]
Frans Hendrik Botes. 2017. NSL-KDD Dataset for WEKA. https://github.com/FransHBotes/NSLKDD-Dataset
[7]
Fernando M. de Almeida, Admilson de R. L. Ribeiro, Edward D. Moreno, and Carlos A. E. Montesco. 2016. Performance evaluation of an artificial neuralnetwork multilayer perceptron with limited weights for detecting denial of service attack on internet of things. In The Twelfth Advanced International Conference on Telecommunications. 82--87.
[8]
Donald O. Hebb. 1949. The organization of behavior: A neuropsychological theory. Wiley, New York.
[9]
K. Jong, E. Marchiori, M. Sebag, and A. van der Vaart. 2004. Feature selection in proteomic pattern data with support vector machines. In 2004 Symposium on Computational Intelligence in Bioinformatics and Computational Biology. 41--48.
[10]
J. Z. Lei and A. Ghorbani. 2004. Network intrusion detection using an improved competitive learning neural network. In Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004. 190--197.
[11]
Janardan Misra and Indranil Saha. 2010. Artificial neural networks in hardware: A survey of two decades of progress. Neurocomputing 74, 1 (2010), 239--255. Artificial Brains.
[12]
Herve Nkiama, Syed Zainudeen Mohd Said, and Muhammad Saidu. 2016. A Subset Feature Elimination Mechanism for Intrusion Detection System. International Journal of Advanced Computer Science and Applications 7, 4 (2016).
[13]
G. Parker and M. Khan. 2016. Distributed neural network: Dynamic learning via backpropagation with hardware neurons using arduino chips. In 2016 International Joint Conference on Neural Networks (IJCNN). 206--212.
[14]
Sebastian Raschka. 2015. Python Machine Learning. Packt Publishing.
[15]
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. 1--6.
[16]
Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin, and Wei-Yang Lin. 2009. Intrusion detection by machine learning: A review. Expert Systems with Applications 36, 10 (2009), 11994--12000.
[17]
L. D. Xu, W. He, and S. Li. 2014. Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics 10, 4 (Nov 2014), 2233--2243.
[18]
K. Q. Yan, S. C. Wang, S. S. Wang, and C. W. Liu. 2010. Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network. In 2010 3rd International Conference on Computer Science and Information Technology, Vol. 1. 114--118.

Cited By

View all
  • (2023)Multi-Class Network Intrusion Detection Using Deep Neural Networks Tuned on Imbalanced Data2023 IEEE International Carnahan Conference on Security Technology (ICCST)10.1109/ICCST59048.2023.10474236(1-5)Online publication date: 11-Oct-2023
  • (2022)PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer BotnetSymmetry10.3390/sym1412248314:12(2483)Online publication date: 23-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
EATIS '18: Proceedings of the Euro American Conference on Telematics and Information Systems
November 2018
297 pages
ISBN:9781450365727
DOI:10.1145/3293614
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • EATIS: Euro American Association on Telematics and Information Systems

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 November 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Arduino
  2. Embedded System
  3. IDS
  4. Intrusion Detection
  5. IoT
  6. KDD
  7. MLP
  8. Multilayer Perceptron

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

EATIS '18

Acceptance Rates

Overall Acceptance Rate 17 of 64 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Multi-Class Network Intrusion Detection Using Deep Neural Networks Tuned on Imbalanced Data2023 IEEE International Carnahan Conference on Security Technology (ICCST)10.1109/ICCST59048.2023.10474236(1-5)Online publication date: 11-Oct-2023
  • (2022)PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer BotnetSymmetry10.3390/sym1412248314:12(2483)Online publication date: 23-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media