A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT

被引:1
|
作者
Telikani, Akbar [1 ]
Rudbardeh, Nima Esmi [3 ]
Soleymanpour, Shiva [2 ]
Shahbahrami, Asadollah [2 ]
Shen, Jun [1 ]
Gaydadjiev, Georgi [3 ]
Hassanpour, Reza [4 ,5 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Univ Guilan, Fac Engn, Dept Comp Engn, Rasht 4199613776, Iran
[3] Univ Groningen, Bernoulli Inst Math Comp Sci & Artificial Intellig, Fac Sci & Engn, NL-9712 CP Groningen, Netherlands
[4] Gidatarim Univ Konya Turkey, Dept Comp Engn, TR-42080 Konya, Turkiye
[5] Rotterdam Univ, Dept Comp Sci, NL-3000 DR Rotterdam, Netherlands
关键词
Internet of Things; Support vector machines; Intrusion detection; Costs; Training; Task analysis; Mathematical models; Deep learning (DL); Internet of things (IoT); intrusion detection; multitask learning; support vector machine (SVM); INTERNET; EFFICIENT; THINGS;
D O I
10.1109/TII.2023.3314208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A problem with machine learning (ML) techniques for detecting intrusions in the Internet of Things (IoT) is that they are ineffective in the detection of low-frequency intrusions. In addition, as ML models are trained using specific attack categories, they cannot recognize unknown attacks. This article integrates strategies of cost-sensitive learning and multitask learning into a hybrid ML model to address these two challenges. The hybrid model consists of an autoencoder for feature extraction and a support vector machine (SVM) for detecting intrusions. In the cost-sensitive learning phase for the class imbalance problem, the hinge loss layer is enhanced to make a classifier strong against low-distributed intrusions. Moreover, to detect unknown attacks, we formulate the SVM as a multitask problem. Experiments on the UNSW-NB15 and BoT-IoT datasets demonstrate the superiority of our model in terms of recall, precision, and F1-score averagely 92.2%, 96.2%, and 94.3%, respectively, over other approaches.
引用
收藏
页码:3880 / 3890
页数:11
相关论文
共 50 条
  • [41] Active learning for cost-sensitive classification
    Krishnamurthy, Akshay
    Agarwal, Alekh
    Huang, Tzu-Kuo
    Daumé Iii, Hal
    Langford, John
    Journal of Machine Learning Research, 2019, 20
  • [42] Cost-Sensitive Learning with Noisy Labels
    Natarajan, Nagarajan
    Dhillon, Inderjit S.
    Ravikumar, Pradeep
    Tewari, Ambuj
    JOURNAL OF MACHINE LEARNING RESEARCH, 2018, 18 : 1 - 33
  • [43] Cost-sensitive learning with neural networks
    Kukar, M
    Kononenko, I
    ECAI 1998: 13TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 1998, : 445 - 449
  • [44] Learning cost-sensitive active classifiers
    Greiner, R
    Grove, AJ
    Roth, D
    ARTIFICIAL INTELLIGENCE, 2002, 139 (02) : 137 - 174
  • [45] Merge reduction for cost-sensitive learning
    Zhang, Aiting
    Xu, Juan
    Chen, Wenbin
    Min, Fan
    Journal of Computational Information Systems, 2014, 10 (23): : 10093 - 10102
  • [46] Two-level machine learning driven intrusion detection model for IoT environments
    Malhi, Yuvraj Singh
    Shekhawat, Virendra Singh
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 21 (3-4) : 229 - 261
  • [47] A Credible Cost-Sensitive Model For Intrusion Response Selection
    Justina, Aderonke Ikuomola
    Simon, Adesina Sodiya
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 222 - 227
  • [48] Cost-Sensitive Support Vector Machine for Semi-Supervised Learning
    Qi, Zhiquan
    Tian, Yingjie
    Shi, Yong
    Yu, Xiaodan
    2013 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2013, 18 : 1684 - 1689
  • [49] Cost-sensitive active learning with a label uniform distribution model
    Wu, Yan-Xue
    Min, Xue-Yang
    Min, Fan
    Wang, Min
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2019, 105 : 49 - 65
  • [50] A Service Dependency Model for Cost-Sensitive Intrusion Response
    Kheir, Nizar
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Debar, Herve
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 626 - +