skip to main content
10.1145/3661167.3661286acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
research-article

Study for Integrating IoT-IDS Datasets: Machine and Deep Learning for Secure IoT Network System

Published: 18 June 2024 Publication History

Abstract

The rapid expansion of Internet of Things (IoT) devices has introduced a new phase of inter connectivity and convenience, while also presenting notable security obstacles. This research paper investigates novel methodologies for enhancing the security of IoT networks by using machine learning and deep learning methodologies. In order to accomplish this objective, two well acknowledged datasets, namely UNSW-NB15 and BoT-IoT, are used for the purpose of constructing and assessing resilient security models. The UNSW-NB15 dataset is well recognized for its extensive compilation of network traffic data, while the BoT-IoT dataset is especially designed to facilitate study on security issues related to the IoT. These datasets provide a wide array of attack scenarios and network traffic patterns, therefore enhancing the diversity of available resources for researchers in this field. By using these datasets, our research endeavours to examine many crucial facets of security inside IoT networks. Initially, machine learning techniques are used for the purpose of conducting intrusion detection on IoT networks. This stage encompasses the categorization of network traffic into two distinct categories: normal and malicious. This process facilitates the prompt detection and reaction to potential threats in real-time. Deep learning methodologies demonstrate exceptional proficiency in capturing complicated patterns and behaviours inherent in IoT network traffic, hence enhancing the capacity to detect intricate and dynamic security risks. In order to assure the practical usability of the presented models, we take into account variables such as computing efficiency and scalability. This is particularly important since IoT devices often have limited resources available. Furthermore, we investigate approaches aimed at enhancing the interpretability of models, therefore offering valuable insights into the underlying decision-making mechanisms, ultimately fostering trust and transparency.
This study makes a valuable contribution to the emerging area of IoT security by showcasing the effectiveness of machine learning and deep learning techniques in enhancing the protection of IoT networks. Our work contributes to the advancement of knowledge about IoT risks and the construction of adaptive, resilient security mechanisms by using the extensive UNSW-NB15 and BoT-IoT datasets.

References

[1]
[1] Farooq, M.U., Waseem, M., Mazhar, S., Khairi, A. and Kamal, T., 2015. A review on internet of things (IoT). International journal of computer applications, 113(1), pp.1-7.
[2]
[2] Kranenburg,V. R. and Bassi, A., 2012. IoT challenges. Communications in Mobile Computing, 1(1), p.9.
[3]
[3] Zhao, J.C., Zhang, J.F., Feng, Y. and Guo, J.X., 2010, July. The study and application of the IOT technology in agriculture. IEEE, In 2010 3rd international conference on computer science and information technology (Vol. 2, pp. 462-465).
[4]
[4] Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X. and Liu, W., 2011, July.IEEE, Study and application on the architecture and key technologies for IOT. In 2011 International Conference on Multimedia Technology (pp. 747-751).
[5]
[5] Liu, T. and Lu, D., 2012, August. The application and development of IoT.IEEE, In 2012 International symposium on information technologies in medicine and education (Vol. 2, pp. 991-994).
[6]
[6] Ahmad, M., Riaz, Q., Zeeshan, M., Tahir, H., Haider, S.A. and Khan, M.S., 2021. Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set. EURASIP Journal on Wireless Communications and Networking, 2021(1), pp.1-23.
[7]
[7] Peterson, J.M., Leevy, J.L. and Khoshgoftaar, T.M., 2021, August. A review and analysis of the bot-iot dataset. In 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE) (pp. 20-27). IEEE.
[8]
[8] Hassan, W.H., 2019. Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, pp.283-294.
[9]
[9] Sharma, N., Shamkuwar, M. and Singh, I., 2019. The history, present and future with IoT. Internet of things and big data analytics for smart generation, pp.27-51.
[10]
[10] Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November. IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications (pp. 230-234).
[11]
[11] Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), pp.1645-1660.
[12]
[12] Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business horizons, 58(4), pp.431-440.
[13]
[13] Saharkhizan, M., Azmoodeh, A., Dehghantanha, A., Choo, K.K.R. and Parizi, R.M., 2020. An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal, 7(9), pp.8852-8859.
[14]
[14] Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A. and Venkatraman, S., 2019. Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, pp.41525-41550.
[15]
[15] Duraibi, S., 2021. A Secure Lightweight Voice Authentication System for IoT Smart Device Users (Doctoral dissertation, University of Idaho).
[16]
[16] Borgesen, M.E. and Kholidy, H.A., 2020. Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems.
[17]
[17] Koroniotis, N., 2020. Designing an effective network forensic framework for the investigation of botnets in the Internet of Things (Doctoral dissertation, UNSW Sydney).
[18]
[18] Roopak, M., Tian, G.Y. and Chambers, J., 2020, January. An intrusion detection system against ddos attacks in iot networks. IEEE, In 2020 10th annual computing and communication workshop and conference (CCWC) (pp. 0562-0567).
[19]
[19] Parra, G.D.L.T., Rad, P., Choo, K.K.R. and Beebe, N., 2020. Detecting Internet of Things attacks using distributed deep learning. Journal of Network and Computer Applications, 163, p.102662.
[20]
[20] Alsoufi, M.A., Razak, S., Siraj, M.M., Nafea, I., Ghaleb, F.A., Saeed, F. and Nasser, M., 2021. Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review. Applied sciences, 11(18), p.8383.
[21]
[21] Yue, C., Wang, L., Wang, D., Duo, R. and Yan, H., 2021. Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network. Security and Communication Networks, 2021, pp.1-21.
[22]
[22] Ge M., X. Fu, N. Syed, Z. Baig, G. Teo, and A. Robles-Kelly, ‘‘Deep learning-based intrusion detection for IoT networks,’’ in Proc. 24th IEEE Pacific Rim Int. Symp. Dependable Comput. (PRDC), Dec. 2019, pp. 256–265.
[23]
[23] Pecori R., A. Tayebi, A. Vannucci, and L. Veltri, ‘‘IoT attack detection with deep learning analysis,’’ in Proc. Int. Joint Conf. Neural Netw. (IJCNN), Jul. 2020, pp. 1–8.
[24]
[24] Idrissi I., M. Azizi, and O. Moussaoui, ‘‘IoT security with deep learning based intrusion detection systems: A systematic literature review,’’ in Proc. 4th Int. Conf. Intell. Comput. Data Sci. (ICDS), Oct. 2020, pp. 1–10.
[25]
[25] D. Li, L. Deng, M. Lee, and H. Wang, ‘‘IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,’’ Int. J. Inf. Manage., vol. 49, pp. 533–545, Oct. 2019.
[26]
[26] C. Yin, S. Zhang, J. Wang, and N. N. Xiong, ‘‘Anomaly detection based on convolutional recurrent autoencoder for IoT time series,’’ IEEE Trans. Syst., Man, Cybern. Syst., early access, Feb. 7, 2020.
[27]
[27] Schuldt, C., Laptev, I. and Caputo, B., 2004, August. Recognizing human actions: a local SVM approach. In Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004. (Vol. 3, pp. 32-36). IEEE.
[28]
[28] Chauhan, V.K., Dahiya, K. and Sharma, A., 2019. Problem formulations and solvers in linear SVM: a review. Artificial Intelligence Review, 52(2), pp.803-855.
[29]
[29] Jakkula, V., 2006. Tutorial on support vector machine (svm). School of EECS, Washington State University, 37(2.5), p.3.
[30]
[30] Shahin, M., Chen, F.F., Bouzary, H., Hosseinzadeh, A. and Rashidifar, R., 2022. A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems. The International Journal of Advanced Manufacturing Technology, 123(5-6), pp.2017-2029.
[31]
[31] Leevy, J.L., Khoshgoftaar, T.M. and Peterson, J.M., 2021, August. Mitigating class imbalance for iot network intrusion detection: a survey. In 2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService) (pp. 143-148). IEEE.
[32]
[32] Banaamah, A.M. and Ahmad, I., 2022. Intrusion Detection in IoT Using Deep Learning. Sensors, 22(21), p.8417.
[33]
[33] Elejla, O.E., Belaton, B., Anbar, M., Alabsi, B. and Al-Ani, A.K., 2019. Comparison of classification algorithms on ICMPv6-based DDoS attacks detection. In Computational Science and Technology (pp. 347-357).
[34]
[34] Badotra, S. and Panda, S.N., 2021. SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. Cluster Computing, 24, pp.501-513.
[35]
[35] Lilhore, U.K., Poongodi, M., Kaur, A., Simaiya, S., Algarni, A.D., Elmannai, H., Vijayakumar, V., Tunze, G.B. and Hamdi, M., 2022. Hybrid model for detection of cervical cancer using causal analysis and machine learning techniques. Computational and Mathematical Methods in Medicine, 2022.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering
June 2024
728 pages
ISBN:9798400717017
DOI:10.1145/3661167
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CNN
  2. DL
  3. Intrusion
  4. ML
  5. SVM
  6. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

EASE 2024

Acceptance Rates

Overall Acceptance Rate 71 of 232 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 51
    Total Downloads
  • Downloads (Last 12 months)51
  • Downloads (Last 6 weeks)7
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media