skip to main content
10.1145/3647444.3647936acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Enhancing IoT Network Security through AIDriven Intrusion Detection with Hybrid AutoencoderGAN Fusion

Published: 13 May 2024 Publication History

Abstract

The rapid growth of Internet of Things (IoT)IoT devices has changed how we connect and interact with our environment. This advancement has also complicated network security. As IoT networks grow, data integrity and confidentiality become more important. This study integrates a hybrid autoencoder and Generative Adversarial Network (GAN) model to use AI to solve security problems. The UNSW-NB15 dataset, a benchmark for network IDSs, is used to rigorously evaluate the proposed model. An autoencoder and GAN combination offers promising IDS for IoT networks. The autoencoder component excels at capturing concise and illustrative data representations, enabling it to spot network anomalies. The GAN component improves the model's ability to generate synthetic data samples that closely resemble network traffic patterns, making it easier to identify complex and novel attacks. The UNSW-NB15 dataset is known for its extensive network traffic data, making it ideal for testing the proposed artificial intelligence-based IDS. The proposed hybrid model achieves 99.13% accuracy. The result outperforms traditional DL methods. The proposed model's increased precision shows its ability to detect and address network anomaly risks.  The proposed system is evaluated using precision, recall, F1-Score, AUC-ROC, MCC, and Cohen's Kappa. The thorough evaluation shows that the Proposed hybrid autoencoder-GAN model provides a complete and efficient IoT network security solution in all dimensions. In conclusion, artificial intelligence-based intrusion detection and a hybrid model that combines autoencoder and generative adversarial network techniques improve IoT network security. The model's UNSW-NB15 dataset accuracy shows its ability to protect IoT ecosystems from many threats. This study helps improve the reliability and robustness of networks, boosting confidence in the growing world of interconnected devices.

References

[1]
M. Vishwakarma and N. Kesswani, “DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT,” Decis. Anal. J., vol. 5, no. October, p. 100142, 2022.
[2]
T. Sowmya and E. A. Mary Anita, “A comprehensive review of AI based intrusion detection system,” Meas. Sensors, vol. 28, no. October 2022, p. 100827, 2023.
[3]
E. E. Abdallah, W. Eleisah, and A. F. Otoom, “Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey,” Procedia Comput. Sci., vol. 201, no. C, pp. 205–212, 2022.
[4]
M. L. Hernandez-Jaimes, A. Martinez-Cruz, K. A. Ramírez-Gutiérrez, and C. Feregrino-Uribe, “Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures,” Internet of Things (Netherlands), vol. 23, no. March, p. 100887, 2023.
[5]
S. Bhattacharya and M. Pandey, “Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices,” Lect. Notes Networks Syst., vol. 612, pp. 11–20, 2023.
[6]
V. Khetani, Y. Gandhi, S. Bhattacharya, S. N. Ajani, and S. Limkar, “Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains,” Int. J. Intell. Syst. Appl. Eng., vol. 11, pp. 253–262, 2023.
[7]
M. Keshk, N. Koroniotis, N. Pham, N. Moustafa, B. Turnbull, and A. Y. Zomaya, “An explainable deep learning-enabled intrusion detection framework in IoT networks,” Inf. Sci. (Ny)., vol. 639, no. August 2022, p. 119000, 2023.
[8]
H. C. Altunay and Z. Albayrak, “A hybrid CNN + LSTMbased intrusion detection system for industrial IoT networks,” Eng. Sci. Technol. an Int. J., vol. 38, p. 101322, 2023.
[9]
O. Bukhari, P. Agarwal, D. Koundal, and S. Zafar, “Anomaly detection using ensemble techniques for boosting the security of intrusion detection system,” Procedia Comput. Sci., vol. 218, pp. 1003–1013, 2023.
[10]
A. T. Assy, Y. Mostafa, A. A. El-khaleq, and M. Mashaly, “Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network,” Procedia Comput. Sci., vol. 220, no. 2019, pp. 78–85, 2023.
[11]
R. Lazzarini, H. Tianfield, and V. Charissis, “Knowledge-Based Systems A stacking ensemble of deep learning models for IoT intrusion detection,” Knowledge-Based Syst., vol. 279, p. 110941, 2023.
[12]
V. Hnamte and J. Hussain, “DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System,” Telemat. Informatics Reports, vol. 10, no. March, p. 100053, 2023.
[13]
S. Adiwal, B. Rajendran, P. S. D., and S. D. Sudarsan, “DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks,” Franklin Open, vol. 2, no. December 2022, p. 100010, 2023.
[14]
P. Sanju, “Enhancing Intrusion Detection in IoT Systems: A Hybrid Metaheuristics-Deep Learning Approach with Ensemble of Recurrent Neural Networks,” J. Eng. Res., no. June, p. 100122, 2023.
[15]
O. Lifandali, N. Abghour, and Z. Chiba, “Feature Selection Using a Combination of Ant Colony Optimization and Random Forest Algorithms Applied To Isolation Forest Based Intrusion Detection System,” Procedia Comput. Sci., vol. 220, pp. 796–805, 2023.
[16]
L. Yang and A. Shami, “IDS-ML: An open source code for Intrusion Detection System development using Machine Learning[Formula presented],” Softw. Impacts, vol. 14, no. November, p. 100446, 2022.
[17]
S. Jain, P. M. Pawar, and R. Muthalagu, “Hybrid intelligent intrusion detection system for internet of things,” Telemat. Informatics Reports, vol. 8, no. September, p. 100030, 2022.
[18]
M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, vol. 19, no. June, p. 100306, 2023.
[19]
R. A. Elsayed, R. A. Hamada, M. I. Abdalla, and S. A. Elsaid, “Securing IoT and SDN systems using deep-learning based automatic intrusion detection,” Ain Shams Eng. J., vol. 14, no. 10, p. 102211, 2023.
[20]
K. Samunnisa, G. S. V. Kumar, and K. Madhavi, “Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods,” Meas. Sensors, vol. 25, no. September 2022, p. 100612, 2023.
[21]
D. Wells, “Unsw_Nb15,” Kaggle. 2019.online access https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb
[22]
Singh, U. P., Saxena, V., Kumar, A., Bhari, P., & Saxena, D. (2022, December). Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[23]
Mittal, A. K., Singh, U. P., Tiwari, A., Dwivedi, S., Joshi, M. K., & Tripathi, K. C. (2015). Short-term predictions by statistical methods in regions of varying dynamical error growth in a chaotic system. Meteorology and Atmospheric Physics, 127, 457-465.
[24]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2015). Predictability study of forced Lorenz model: an artificial neural network approach. History, 40(181), 27-33.
[25]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2020). Evaluating the predictability of central Indian rainfall on short and long timescales using theory of nonlinear dynamics. Journal of water and Climate Change, 11(4), 1134-1149.
[26]
Singh, U., Pathak, M., Malhotra, R., & Chauhan, M. (2012). Secure communication protocol for ATM using TLS handshake. Journal of Engineering Research and Applications (IJERA), 2(2), 838-948.
[27]
Singh, U. P., & Mittal, A. K. (2021). Testing reliability of the spatial Hurst exponent method for detecting a change point. Journal of Water and Climate Change, 12(8), 3661-3674.
[28]
Tiwari, A., Mittal, A. K., Dwivedi, S., & Singh, U. P. (2015). Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model. Climate Change, 1(4), 411-417.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Deep Learning
  2. IOT
  3. Intrusion Detection System
  4. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 56
    Total Downloads
  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)12
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media