skip to main content
10.1145/3565386.3565493acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
poster

Deep learning driven anomaly based intrusion detection system for IoT: poster abstract

Published:22 November 2022Publication History

ABSTRACT

We propose a hybrid framework of machine learning and deep learning networks for efficient classification of attacks and anomalies. The machine learning algorithms are adopted to distinguish between normal data and anomaly data. The deep networks, on the other hand, are used to perform anomaly type classification. The framework is optimally tuned by selecting the most efficient hyperparameter values. These values are selected experimentally for the proposed deep network for optimal and efficient training of the network. We further propose the use of the Synthetic Minority Oversampling Technique (SMOTE) to address the data imbalance problem and Particle swarm optimization (PSO) as a feature selection mechanism to improve accuracy as well as execution time.

References

  1. Maxime Claprood, Michel Chouteau, and Li Zhen Cheng. 2008. Rapid detection and classification of airborne time-domain electromagnetic anomalies using weighted multi-linear regression. Exploration Geophysics 39, 3 (2008), 164--180.Google ScholarGoogle ScholarCross RefCross Ref
  2. Eduardo De La Hoz, Andrés Ortiz, Julio Ortega, and Emiro De la Hoz. 2013. Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques. In International Conference on Hybrid Artificial Intelligence Systems. Springer, 103--111.Google ScholarGoogle ScholarCross RefCross Ref
  3. Saad Gadal, Rania Mokhtar, Maha Abdelhaq, Raed Alsaqour, Elmustafa Sayed Ali, and Rashid Saeed. 2022. Machine Learning-Based Anomaly Detection Using K-Mean Array and Sequential Minimal Optimization. Electronics 11, 14 (2022), 2158.Google ScholarGoogle ScholarCross RefCross Ref
  4. M Ganesh Karthik and MB Krishnan. 2021. Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks. Journal of Ambient Intelligence and Humanized Computing (2021), 1--11.Google ScholarGoogle Scholar
  5. Liwei Kuang and Mohammad Zulkernine. 2008. An anomaly intrusion detection method using the CSI-KNN algorithm. In Proceedings of the 2008 ACM symposium on Applied computing. 921--926.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Imtiaz Ullah and Qusay H Mahmoud. 2020. A scheme for generating a dataset for anomalous activity detection in iot networks. In Canadian Conference on Artificial Intelligence. Springer, 508--520.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    Middleware Demos and Posters '22: Proceedings of the 23rd International Middleware Conference Demos and Posters
    November 2022
    32 pages
    ISBN:9781450399319
    DOI:10.1145/3565386

    Copyright © 2022 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 November 2022

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    Overall Acceptance Rate203of948submissions,21%
  • Article Metrics

    • Downloads (Last 12 months)33
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader