skip to main content
10.1145/3697467.3697588acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotmlConference Proceedingsconference-collections
research-article

Transfer Learning and CNN-based Framework for Intrusion Detection in Highway Internet Toll Systems

Published: 08 November 2024 Publication History

Abstract

Nowadays, the frequency and intensity of cyber attacks have escalated significantly. Traditional network security defenses, which predominantly rely on static, predefined rules to distinguish between legitimate and malicious network traffic, have proven inadequate in identifying complex and sophisticated network intrusions. The integration of artificial intelligence (AI) technologies offers a pathway to enhancing the reliability and effectiveness of these defenses. Convolutional neural networks (CNNs), a subset of deep learning models, have achieved notable advancements in image processing, thereby gaining considerable scholarly attention. By harnessing the capabilities of CNN models, complex network attacks can be efficiently detected through the transformation of network traffic datasets into image representations. This study proposes an intelligent Intrusion Detection System (IDS) model, designed to enhance the security of highway internet-based toll systems, which integrates optimized CNN architectures, transfer learning, and ensemble learning methodologies. The ensemble model is trained on the transformed data and validated using the CICIDS2019 network dataset. The experimental results indicate a detection accuracy of 99.91%, substantiating the feasibility and effectiveness of the proposed approach within this research.

References

[1]
Yang, Li, Dimitrios Michael Manias, and Abdallah Shami. “Pwpae: An ensemble framework for concept drift adaptation in iot data streams." 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 2021.
[2]
Liu, Lan, et al. “Deep Learning‐Based Network Security Data Sampling and Anomaly Prediction in Future Network." Discrete Dynamics in Nature and Society 2020.1 (2020): 4163825.
[3]
Yang, Li, and Abdallah Shami. “On hyperparameter optimization of machine learning algorithms: Theory and practice." Neurocomputing 415 (2020): 295-316.
[4]
Wang, Lidong, and Randy Jones. “Big data analytics in cyber security: network traffic and attacks." Journal of Computer Information Systems 61.5 (2021): 410-417.
[5]
Zhang, Chaoyun, Xavier Costa-Pérez, and Paul Patras. “Tiki-taka: Attacking and defending deep learning-based intrusion detection systems." Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. 2020.
[6]
Khalaf, Bashar Ahmed, et al. “Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods." IEEE Access 7 (2019): 51691-51713.
[7]
Li, Zhipeng, et al. “Intrusion detection using convolutional neural networks for representation learning." International conference on neural information processing. Cham: Springer International Publishing, 2017.
[8]
Large, James, Jason Lines, and Anthony Bagnall. “A probabilistic classifier ensemble weighting scheme based on cross-validated accuracy estimates." Data mining and knowledge discovery 33.6 (2019): 1674-1709.
[9]
Yang, Li, and Abdallah Shami. “A lightweight concept drift detection and adaptation framework for IoT data streams." IEEE Internet of Things Magazine 4.2 (2021): 96-101.
[10]
Feurer, Matthias, and Frank Hutter. “Hyperparameter optimization." Automated machine learning: Methods, systems, challenges (2019): 3-33.
[11]
Yang, Li, and Abdallah Shami. “On hyperparameter optimization of machine learning algorithms: Theory and practice." Neurocomputing 415 (2020): 295-316.
[12]
Sharafaldin, Iman, et al. “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy." 2019 international carnahan conference on security technology (ICCST). IEEE, 2019.
[13]
Salman, Ola, et al. “A machine learning based framework for IoT device identification and abnormal traffic detection." Transactions on Emerging Telecommunications Technologies 33.3 (2022): e3743.
[14]
Cam, Nguyen Tan, and Nguyen Gia Trung. “An Intelligent Approach to Improving the Performance of Threat Detection in IoT." IEEE Access 11 (2023): 44319-44334.
[15]
Gohil, Maulik, and Sathish Kumar. “Evaluation of classification algorithms for distributed denial of service attack detection." 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, 2020.
[16]
Rajagopal, Smitha, Poornima Panduranga Kundapur, and K. S. Hareesha. “Towards effective network intrusion detection: from concept to creation on Azure cloud." IEEE Access 9 (2021): 19723-19742.

Index Terms

  1. Transfer Learning and CNN-based Framework for Intrusion Detection in Highway Internet Toll Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IoTML '24: Proceedings of the 2024 4th International Conference on Internet of Things and Machine Learning
    August 2024
    443 pages
    ISBN:9798400710353
    DOI:10.1145/3697467
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 November 2024

    Check for updates

    Author Tags

    1. Convolutional Neural Networks
    2. Data Transformation
    3. Ensemble Model
    4. IDS
    5. Transfer Learning

    Qualifiers

    • Research-article

    Conference

    IoTML 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 52
      Total Downloads
    • Downloads (Last 12 months)52
    • Downloads (Last 6 weeks)29
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media