An Efficient Two-Stage Network Intrusion Detection System in the Internet of Things

被引:9
|
作者
Zhang, Hongpo [1 ,2 ]
Zhang, Bo [1 ]
Huang, Lulu [2 ]
Zhang, Zhaozhe [1 ]
Huang, Haizhaoyang [1 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Univ, Cooperat Innovat Ctr Internet Healthcare, Zhengzhou 450001, Peoples R China
关键词
internet of things; network intrusion detection; convolutional neural network; class imbalance; LightGBM; NEURAL-NETWORK; IOT;
D O I
10.3390/info14020077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices and services provide convenience but face serious security threats. The network intrusion detection system is vital in ensuring the security of the IoT environment. In the IoT environment, we propose a novel two-stage intrusion detection model that combines machine learning and deep learning to deal with the class imbalance of network traffic data and achieve fine-grained intrusion detection on large-scale flow data. The superiority of the model is verified on the newer and larger CSE-CIC-IDS2018 dataset. In Stage-1, the LightGBM algorithm recognizes normal and abnormal network traffic data and compares six classic machine learning techniques. In Stage-2, the Convolutional Neural Network (CNN) performs fine-grained attack class detection on the samples predicted to be abnormal in Stage-1. The Stage-2 multiclass classification achieves a detection rate of 99.896%, F1score of 99.862%, and an MCC of 95.922%. The total training time of the two-stage model is 74.876 s. The detection time of a sample is 0.0172 milliseconds. Moreover, we set up an optional Synthetic Minority Over-sampling Technique based on the imbalance ratio (IR-SMOTE) of the dataset in Stage-2. Experimental results show that, compared with SMOTE technology, the two-stage intrusion detection model can adapt to imbalanced datasets well and reveal higher efficiency and better performance when processing large-scale flow data, outperforming state-of-the-art intrusion detection systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
    Alshathri S.
    El-Sayed A.
    El-Shafai W.
    El-Din Hemdan E.
    Computer Systems Science and Engineering, 2023, 46 (01): : 819 - 834
  • [32] The robust scheme for intrusion detection system in Internet of Things
    Nguyen, Dat-Thinh
    Le, Kim-Hung
    INTERNET OF THINGS, 2023, 24
  • [33] EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things
    Dwivedi, Anshu Kumar
    Mehra, Pawan Singh
    Pal, Om
    Doja, Mohammad Najmud
    Alam, Bashir
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (17)
  • [34] Dynamic distributed generative adversarial network for intrusion detection system over internet of things
    Balaji, S.
    Narayanan, S. Sankara
    WIRELESS NETWORKS, 2023, 29 (05) : 1949 - 1967
  • [35] Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things
    Ravi V.
    Pham T.D.
    Alazab M.
    IEEE Internet of Things Magazine, 2023, 6 (02): : 50 - 54
  • [36] Dynamic distributed generative adversarial network for intrusion detection system over internet of things
    S. Balaji
    S. Sankara Narayanan
    Wireless Networks, 2023, 29 : 1949 - 1967
  • [37] Encoded Flow Features for Network Intrusion Detection in Internet of Things
    Siddiqui, Abdul Jabbar
    Boukerche, Azzedine
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [38] Automated Network Intrusion Detection for Internet of Things: Security Enhancements
    Maghrabi, Louai A.
    IEEE ACCESS, 2024, 12 : 30839 - 30851
  • [39] Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network
    Yang, Aimin
    Zhuansun, Yunxi
    Liu, Chenshuai
    Li, Jie
    Zhang, Chunying
    IEEE ACCESS, 2019, 7 : 106043 - 106052
  • [40] Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
    Shu, Jian
    Lu, Jiazhong
    IET INFORMATION SECURITY, 2025, 2025 (01)