Interpretable intrusion detection for next generation of Internet of Things

被引:6
|
作者
Djenouri, Youcef [1 ]
Belhadi, Asma [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
Lin, Jerry Chun-Wei [6 ]
Yazidi, Anis [7 ]
机构
[1] NORCE, Norwegian Res Ctr, Oslo, Norway
[2] Kristiania Univ Coll, Oslo, Norway
[3] Brandon Univ, Brandon, MB, Canada
[4] China Med Univ, Taichung, Taiwan
[5] Lebanese Amer Univ, Beirut, Lebanon
[6] Western Norway Univ Appl Sci, Bergen, Norway
[7] OsloMet, Oslo, Norway
关键词
Intrusion detection; XAI; NG-IoT; Deep learning; NETWORK;
D O I
10.1016/j.comcom.2023.03.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new framework for intrusion detection in the next-generation Internet of Things. MinMax normalization strategy is used to collect and preprocess data. The Marine Predator algorithm is then used to select relevant features to be used in the learning process. The selected features are then trained with an advanced and state-of-the-art recurrent neural network that includes an attention mechanism. Finally, Shapely values are calculated to determine how much each feature contributes to the final output. The dataset NSL-KDD was used for intensive simulations. The results show the advantages of the proposed system as well as its superiority over state-of-the-art methods. In fact, the proposed solution achieved a rate of more than 94% for both true negative and true position, while the rates of the existing solutions are below 90% for the challenging NSL-KDD datasets.
引用
收藏
页码:192 / 198
页数:7
相关论文
共 50 条
  • [31] Internet of Things: Security Challenges for Next Generation Networks
    Gupta, KrishnaKanth
    Shukla, Sapna
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 315 - 318
  • [32] Composition of Advanced (μ) Services for the Next Generation of the Internet of Things
    Di Salle, Amleto
    Gallo, Francesco
    Pompilio, Claudio
    [J]. SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS (STAF 2016), 2016, 9946 : 436 - 444
  • [33] Fog Networking: An Enabler for Next Generation Internet of Things
    Qaisar, Saad
    Riaz, Nida
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT II, 2016, 9787 : 353 - 365
  • [34] Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things
    Deshmukh-Bhosale, Snehal
    Sonavane, S. S.
    [J]. ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 513 - 523
  • [35] An Intrusion Detection System for Denial of Service Attack Detection in Internet of Things
    Lira Melo Sousa, Breno Fabricio
    Abdelouahab, Zair
    Pavao Lopes, Denivaldo Cicero
    Soeiro, Natalia Costa
    Ribeiro, Willian Franca
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [36] Intrusion detection systems for the internet of things: a probabilistic anomaly detection approach
    Bali, Nadia
    Jaoua, Zied
    Bzeouich, Olfa
    Abbassi, Imed
    [J]. International Journal of Computers and Applications, 2024, 46 (11) : 933 - 944
  • [37] Intrusion Detection in Internet of Things With MQTT Protocol-An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution
    Gorzalczany, Marian B.
    Rudzinski, Filip
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24): : 24843 - 24855
  • [38] The flaws of Internet of Things (IoT) intrusion detection and prevention schemes
    Ghayyad, Saher
    Du, Shengzhi
    Kurien, Anish
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2022, 38 (01) : 25 - 36
  • [39] Blockchain based federated learning for intrusion detection for Internet of Things
    Nan Sun
    Wei Wang
    Yongxin Tong
    Kexin Liu
    [J]. Frontiers of Computer Science, 2024, 18
  • [40] A two stage lightweight approach for intrusion detection in Internet of Things
    Li, Zeyu
    Yao, Wenbin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 257