A Network Intrusion Detection System Based on Enhanced CNN2D for IoT Architecture

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 4
Year of Publication : 2024
Authors : Manasa Koppula, L.M.I. Leo Joseph
pdf
How to Cite?

Manasa Koppula, L.M.I. Leo Joseph, "A Network Intrusion Detection System Based on Enhanced CNN2D for IoT Architecture," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 4, pp. 68-79, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I4P108

Abstract:

The Internet of Things has experienced explosive evolution as a ground-breaking phenomenon since its conception. The security sector has witnessed enormous growth in cyberattacks as a consequence of the increasing growth of IoT devices, which expanded the attack vector for hackers to carry out significantly more damaging vulnerabilities. A key component of assuring the cybersecurity of IoT is the identification of anomalies in network activity using an intrusion detection system. Conventional machine learning methods appear vain in the face of inconsistent network expertise and several attack tactics. Deep learning methods have proved their capability to recognize irregularities in a wide range of research fields accurately. An excellent substitute for conventional methods of anomaly detection and classification is Convolutional Neural Networks (CNN). In this research, a novel IDS-based improved CNN model for IoT networks has been developed. To solve the issue of overfitting and improve the sophistication of the classifier, various regularization techniques, including L1, L2, Dropout, and multi-regularization, have been deployed. The experimental findings demonstrate that, when contrasted to the other CNN2D models, the proposed method outperforms with an above 98% accuracy. The Detection Rate and False Discovery Rate of individual classes are above 0.9 and below 0.1, respectively.

Keywords:

Internet of Things, Convolutional Neural Networks, Regularization, Overfitting, Intrusion Detection System.

References:

[1] Phillip Williams et al., “A Survey on Security in Internet of Things with a Focus on the Impact of Emerging Technologies,” Internet of Things, vol. 19, pp. 1-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Lionel Sujay Vailshery, Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2021, with Forecasts from 2022 to 2030, 2022. [Online]. Available: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/
[3] Swathy Akshaya M., and Padmavathi G., “A Survey on Various Intrusion Detection System Tools and Methods in Cloud Computing,” 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 439-445, 2019.
[Google Scholar] [Publisher Link]
[4] Hongxin Hu, Gail-Joon Ahn, and Ketan Kulkarni, “Detecting and Resolving Firewall Policy Anomalies,” IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 318-331, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Fraidoon Sattari et al., “A Hybrid Deep Learning Approach for Bottleneck Detection in IoT,” IEEE Access, vol. 10, pp. 77039-77053, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Chao Wang et al., “Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder,” Symmetry, vol. 15, no. 3, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jingyi Su, Shan He, and Yan Wu, “Features Selection and Prediction for IoT Attacks,” High-Confidence Computing, vol. 2, no. 2, pp. 1- 6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Imtiaz Ullah, and Qusay H. Mahmoud, “A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks,” Advances in Artificial Intelligence, pp. 508-520, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Peng Jiang, Hongyi Wu, and Chunsheng Xin, “A Channel State Information Based Virtual MAC Spoofing Detector,” High-Confidence Computing, vol. 2, no. 3, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] R. Aiyshwariya Devi, and A.R. Arunachalam, “Enhancement of IoT Device Security Using an Improved Elliptic Curve Cryptography Algorithm and Malware Detection Utilizing Deep LSTM,” High-Confidence Computing, vol. 3, no. 2, pp. 1-14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Arthur A.M. Teodoro et al., “An Analysis of Image Features Extracted by CNNs to Design Classification Models for COVID-19 and Non-COVID-19,” Journal of Signal Processing Systems, vol. 95, no. 2-3, pp. 101-113, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nour Moustafa, and Jill Slay, “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set,” 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, pp. 1-6, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Nickolaos Koroniotis et al., “Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset,” Future Generation Computer Systems, vol. 100, pp. 779-796, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] N.V. Chawla et al., “SMOTE: Synthetic Minority Over-Sampling Technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321-357, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ogobuchi Daniel Okey et al., “Transfer Learning Approach to IDS on Cloud IoT Devices Using Optimized CNN,” IEEE Access, vol. 11, pp. 1023-1038, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Nickolaos Koroniotis, “Designing an Effective Network Forensic Framework for the Investigation of Botnets in the Internet of Things,’’ Ph.D. Dissertation and Thesis, University of New South Wales, Australia, pp. 1-245, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yanqing Yang et al., “Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network,” Sensors, vol. 19, no. 11, pp. 1-20, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Qiao Tian, Jingmei Li, and Haibo Liu, “A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning,” IEEE Access, vol. 7, pp. 38688-38695, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Nadra Guizani, and Arif Ghafoor, “A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1218-1228, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Rana Abou Khamis, “Evaluating Adversarial Learning on Different Types of Deep Learning-Based Intrusion Detection Systems Using Min-Max Optimization,” Master’s Thesis, Carleton University, Canada, pp. 1-139, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Olakunle Ibitoye, Omair Shafiq, and Ashraf Matrawy, “Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks,” 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, USA, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Mohamed Amine Ferrag, and Leandros Maglaras, “DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1285-1297, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Mohamed Amine Ferrag et al., “Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study,” Journal of Information Security and Applications, vol. 50, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Muhammad Zeeshan et al., “Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets,” IEEE Access, vol. 10, pp. 2269-2283, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ruijie Zhao et al., “A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things,” IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9960-9972, 2022.
[CrossRef] [Google Scholar] [Publisher Link]