Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM

被引:0
|
作者
Wang, Jianhua [1 ]
机构
[1] Northwest Minzu University, Gansu, Lanzhou,730030, China
来源
关键词
Feature Selection - Intrusion detection - Linear transformations - Medium access control - Network security - Photomapping;
D O I
10.13052/jcsm2245-1439.13516
中图分类号
学科分类号
摘要
In order to improve the performance of industrial Internet of Things ARP virus attack detection methods, this paper proposes an improved CNN BiLSTM based industrial Internet of Things ARP virus attack detection method. Firstly, analyze the data flow of normal data, construct an industrial Internet of Things ARP virus intrusion dataset, and obtain the sample distribution of the ETI dataset. Secondly, based on the domain knowledge of ETCN, a preliminary manual selection was performed on all extracted head features, and a feature correlation discrimination algorithm was designed to further screen the features. Then, the Pearson correlation coefficient is used to calculate its linear correlation, the distance correlation coefficient is used to calculate its nonlinear correlation, and a comprehensive calculation formula is designed based on the principle of maximum correlation and minimum redundancy to establish a comprehensive measurement coefficient. The value of the features selected in the first stage is ranked using this coefficient, and different feature subsets are constructed through sequential search. Effective features are selected based on the performance of the intrusion detection models trained on different feature subsets. Implement industrial Internet of Things (IoT) ARP feature extraction through feature extraction, data cleaning, feature transformation, and feature selection. Finally, an improved CNN BiLSTM structure is constructed by using CNN to filter out a large number of packets that are not related to the attack and have weak correlation in the data. Significant features are extracted from the data, and the feature data extracted by CNN is timestamped through timeDistribution. After flattening into one-dimensional data through the flat layer, it is used as input to the BILSTM layer. We used a bidirectional long short-term memory network (BILSTM) to train industrial IoT ARP virus attacks and output the final ARP virus attack detection results. The experimental results show that in the first 10 rounds of training, the training accuracy and validation accuracy of the model rapidly increase, indicating that the model learns a large amount of information in this stage of iteration. We achieved high F1 score (94.42%), high accuracy (94.58%), and low false alarm rate (5.33%) on the ETI dataset. The model consumed very little training time (8.0746s) and testing time (0.1664s). Verified the effectiveness of the design model. © 2024 River Publishers.
引用
收藏
页码:1173 / 1206
相关论文
共 50 条
  • [41] Industrial Internet Intrusion Detection Based on Res-CNN-SRU
    Cai, Zengyu
    Si, Yajie
    Zhang, Jianwei
    Zhu, Liang
    Li, Pengrong
    Feng, Yuan
    ELECTRONICS, 2023, 12 (15)
  • [42] A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network
    Latif, Shahid
    Zou, Zhuo
    Idrees, Zeba
    Ahmad, Jawad
    IEEE ACCESS, 2020, 8 (08): : 89337 - 89350
  • [43] Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Rauf, Hafiz Tayyab
    Damasevicius, Robertas
    ELECTRONICS, 2021, 10 (11)
  • [44] An Automata Based Intrusion Detection Method for Internet of Things
    Fu, Yulong
    Yan, Zheng
    Cao, Jin
    Kone, Ousmane
    Cao, Xuefei
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [45] A Novel Industrial Intrusion Detection Method based on Threshold-optimized CNN-BiLSTM-Attention using ROC Curve
    Lan, Mindi
    Luo, Jun
    Chai, Senchun
    Chai, Ruiqi
    Zhang, Chen
    Zhang, Baihai
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7384 - 7389
  • [46] A Network Intrusion Detection Method Based on Improved Bi-LSTM in Internet of Things Environment
    Fan, Xingliang
    Yang, Ruimei
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (03)
  • [47] Detection of false data injection attack in the Internet of things
    Hu Xiangdong
    Yu Pengqin
    MANAGEMENT, MANUFACTURING AND MATERIALS ENGINEERING, PTS 1 AND 2, 2012, 452-453 : 932 - +
  • [48] Statistical based distributed denial of service attack detection research in internet of things
    Chen H.-S.
    Chen J.-J.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2020, 50 (05): : 1894 - 1904
  • [49] Survey of Rank Attack Detection Algorithms in Internet of Things
    Kalyani, S.
    Vydeki, D.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2136 - 2141
  • [50] An Improved CNN for Intrusion Detection Method Based on ResNet
    Cai, Zengyu
    Li, Pengrong
    Zhang, Jianwei
    Si, Yajie
    Feng, Yuan
    International Journal of Network Security, 2024, 26 (04) : 694 - 702