iDetector: A Novel Real-Time Intrusion Detection Solution for IoT Networks

被引:0
|
作者
Kong X. [1 ]
Zhou Y. [1 ]
Xiao Y. [1 ]
Ye X. [1 ]
Qi H. [1 ]
Liu X. [2 ]
机构
[1] School of Computer Science and Technology, Dalian University of Technology, Dalian
[2] College of Intelligence and Computing, Tianjin University, Tianjin
关键词
botnet; Image edge detection; internet of things; Internet of Things; Intrusion detection; Logic gates; Oral communication; Real-time systems; Traffic classification; Training;
D O I
10.1109/JIOT.2024.3416746
中图分类号
学科分类号
摘要
The rapid proliferation of IoT devices has brought about unprecedented convenience to people’s daily lives. However, this growth has also created opportunities for hackers to launch large-scale botnet attacks using these devices. As a result, it is critical to deploy real-time traffic classifiers on edge gateways to detect network intrusions and improve near-source protection capabilities. To this end, we propose iDetector, a novel realtime intrusion detection solution for IoT networks that is simple in structure and easy to reproduce. iDetector samples network conversations in real-time using a sliding sampling window and generates traffic samples that integrate multiple features. This allows the samples to accurately capture the patterns of each type of traffic. We propose the Non-linear Feature Transformation (NFT) algorithm based on the prior distribution of traffic features to increase the information entropy of the samples and thereby improve the classification performance. To enable deployment on edge gateways, we propose EdgeNet, a lightweight deep neural network model that utilizes Depthwise Separable Convolution and self-attention mechanism to enhance classification performance while reducing the number of model parameters. Experimental evaluations show that our solution outperforms state-of-the-art deep learning-based solutions in terms of classification performance and has faster classification speed on resource-constrained edge gateways. IEEE
引用
下载
收藏
页码:1 / 1
相关论文
共 50 条
  • [21] A real-time intrusion detection system (IDS) for large scale networks and its evaluations
    Kato, N
    Nitou, H
    Ohta, K
    Mansfield, G
    Nemoto, Y
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (11) : 1817 - 1825
  • [22] An ideal IoT solution for real-time web monitoring
    Diogo, Pedro
    Lopes, Nuno Vasco
    Reis, Luis Paulo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2193 - 2209
  • [23] An ideal IoT solution for real-time web monitoring
    Pedro Diogo
    Nuno Vasco Lopes
    Luis Paulo Reis
    Cluster Computing, 2017, 20 : 2193 - 2209
  • [24] Real-Time Intrusion Detection with Fuzzy Genetic Algorithm
    Jongsuebsuk, P.
    Wattanapongsakorn, N.
    Charnsripinyo, C.
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2013,
  • [25] SVELTE: Real-time intrusion detection in the Internet of Things
    Raza, Shahid
    Wallgren, Linus
    Voigt, Thiemo
    AD HOC NETWORKS, 2013, 11 (08) : 2661 - 2674
  • [26] Online training of SVMs for real-time intrusion detection
    Zhang, ZH
    Shen, H
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 568 - 573
  • [27] Robust real-time intrusion detection with fuzzy classification
    Milanesi, G
    Sarti, A
    Tubaro, S
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2002, : 437 - 440
  • [28] Real-time intrusion detection with emphasis on insider attacks
    Upadhyaya, S
    COMPUTER NETWORK SECURITY, 2003, 2776 : 82 - 85
  • [29] Towards Real-Time Intrusion Detection for NetFlow and IPFIX
    Hofstede, Rick
    Bartos, Vaclav
    Sperotto, Anna
    Pras, Aiko
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 227 - 234
  • [30] A Bayesian classification model for real-time intrusion detection
    Puttini, RS
    Marrakchi, Z
    Mé, L
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2003, 659 : 150 - 162