Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM

被引:0
|
作者
Wang, Jianhua [1 ]
机构
[1] Northwest Minzu University, Gansu, Lanzhou,730030, China
来源
关键词
Feature Selection - Intrusion detection - Linear transformations - Medium access control - Network security - Photomapping;
D O I
10.13052/jcsm2245-1439.13516
中图分类号
学科分类号
摘要
In order to improve the performance of industrial Internet of Things ARP virus attack detection methods, this paper proposes an improved CNN BiLSTM based industrial Internet of Things ARP virus attack detection method. Firstly, analyze the data flow of normal data, construct an industrial Internet of Things ARP virus intrusion dataset, and obtain the sample distribution of the ETI dataset. Secondly, based on the domain knowledge of ETCN, a preliminary manual selection was performed on all extracted head features, and a feature correlation discrimination algorithm was designed to further screen the features. Then, the Pearson correlation coefficient is used to calculate its linear correlation, the distance correlation coefficient is used to calculate its nonlinear correlation, and a comprehensive calculation formula is designed based on the principle of maximum correlation and minimum redundancy to establish a comprehensive measurement coefficient. The value of the features selected in the first stage is ranked using this coefficient, and different feature subsets are constructed through sequential search. Effective features are selected based on the performance of the intrusion detection models trained on different feature subsets. Implement industrial Internet of Things (IoT) ARP feature extraction through feature extraction, data cleaning, feature transformation, and feature selection. Finally, an improved CNN BiLSTM structure is constructed by using CNN to filter out a large number of packets that are not related to the attack and have weak correlation in the data. Significant features are extracted from the data, and the feature data extracted by CNN is timestamped through timeDistribution. After flattening into one-dimensional data through the flat layer, it is used as input to the BILSTM layer. We used a bidirectional long short-term memory network (BILSTM) to train industrial IoT ARP virus attacks and output the final ARP virus attack detection results. The experimental results show that in the first 10 rounds of training, the training accuracy and validation accuracy of the model rapidly increase, indicating that the model learns a large amount of information in this stage of iteration. We achieved high F1 score (94.42%), high accuracy (94.58%), and low false alarm rate (5.33%) on the ETI dataset. The model consumed very little training time (8.0746s) and testing time (0.1664s). Verified the effectiveness of the design model. © 2024 River Publishers.
引用
收藏
页码:1173 / 1206
相关论文
共 50 条
  • [1] RETRACTED: Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM (Retracted Article)
    Li, Aichuan
    Yi, Shujuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Network Intrusion Detection Method Based on Improved CNN in Internet of Things Environment
    Wang, Yulin
    Wang, Jinheng
    Jin, Honglin
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [3] A New Industrial Intrusion Detection Method Based on CNN-BiLSTM
    Wang, Jun
    Si, Changfu
    Wang, Zhen
    Fu, Qiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 4297 - 4318
  • [4] Deep Learning based DDoS Attack Detection in Internet of Things: An Optimized CNN-BILSTM Architecture with Transfer Learning and Regularization Techniques
    Jebril, Iqbal
    Premkumar, M.
    Abdulsahib, Ghaida Muttashar
    Ashokkumar, S. R.
    Dhanasekaran, S.
    Khalaf, Oshamah Ibrahim
    Algburi, Sameer
    INFOCOMMUNICATIONS JOURNAL, 2024, 16 (01): : 2 - 11
  • [5] CNN-BiLSTM Hybrid Model for Network Anomaly Detection in Internet of Things
    Omarov, Bauyrzhan
    Auelbekov, Omirlan
    Suliman, Azizah
    Zhaxanova, Ainur
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (03) : 436 - 444
  • [6] CNN-Based Malware Variants Detection Method for Internet of Things
    Li, Qi
    Mi, Jiaxin
    Li, Weishi
    Wang, Junfeng
    Cheng, Mingyu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (23) : 16946 - 16962
  • [7] CNN-AttBiLSTM Mechanism: A DDoS Attack Detection Method Based on Attention Mechanism and CNN-BiLSTM
    Zhao, Junjie
    Liu, Yongmin
    Zhang, Qianlei
    Zheng, Xinying
    IEEE ACCESS, 2023, 11 : 136308 - 136317
  • [8] Intrusion Detection Model for Industrial Internet of Things Based on Improved Autoencoder
    Zhang, Wumei
    Zhang, Yongzhen
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [9] Intrusion Detection Model for Industrial Internet of Things Based on Improved Autoencoder
    Zhang, Wumei
    Zhang, Yongzhen
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [10] Improved Internet of Things Intrusion Detection Model for CNN and RNN
    Li, Xiaojia
    Zhao, Guosheng
    Wang, Yang
    Ning, Ke
    Computer Engineering and Applications, 2023, 59 (14) : 242 - 250