Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks

被引:10
|
作者
Butt, Nazia [1 ]
Shahid, Ana [1 ]
Qureshi, Kashif Naseer [2 ]
Haider, Sajjad [1 ]
Ibrahim, Ashraf Osman [3 ]
Binzagr, Faisal [4 ]
Arshad, Noman [5 ]
机构
[1] Natl Univ Modern Languages, Fac Engn & Comp Sci, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Univ Limerick, Dept Elect & Comp Engn, Limerick V94T9PX, Ireland
[3] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Malaysia
[4] King Abdulaziz Univ, Dept Comp Sci, POB 344, Rabigh 21911, Saudi Arabia
[5] Bahria Univ, Dept Comp Sci, Islamabad 44000, Pakistan
关键词
internet of things; smart homes; machine learning; intrusion; attacks; detection;
D O I
10.3390/math10234598
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies. The smart home is one of the areas of IoT networks, where home appliances are connected to the internet and smart grids. However, these networks are at high risk in terms of security violations. Different kinds of attacks have been conducted on these networks where the user lost their data. Intrusion detection systems (IDSs) are used to detect and prevent cyberattacks. These systems are based on machine and deep learning techniques and still suffer from fitting or overfitting issues. This paper proposes a novel solution for anomaly-based intrusion detection for smart home networks. The proposed model addresses overfitting/underfitting issues and ensures high performance in terms of hybridization. The proposed solution uses feature selection and hyperparameter tuning and was tested with an existing dataset. The experimental results indicated a significant increase in performance while minimizing misclassification and other limitations as compared to state-of-the-art solutions.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments
    Choudhary V.
    Tanwar S.
    Multimedia Tools and Applications, 2024, 83 (36) : 84331 - 84355
  • [32] Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices
    Isma'ila, Umar Audi
    Danyaro, Kamaluddeen Usman
    Muazu, Aminu Aminu
    Maiwada, Umar Danjuma
    IEEE ACCESS, 2024, 12 : 30941 - 30961
  • [33] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [34] Machine Learning-based Intrusion Detection for IoT Devices in Smart Home
    Li, Taotao
    Hong, Zhen
    Yu, Li
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 277 - 282
  • [35] A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison
    Kumar, Shailender
    Jha, Namrata
    Sachdeva, Nikhil
    MACHINE LEARNING AND BIG DATA ANALYTICS (PROCEEDINGS OF INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND BIG DATA ANALYTICS (ICMLBDA) 2021), 2022, 256 : 227 - 235
  • [36] An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Porfyrakis, Kyriakos
    Ribeiro, Jose C.
    Rodriguez, Jonathan
    ELECTRONICS, 2021, 10 (21)
  • [37] Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
    Al-Fuhaidi, Belal
    Farae, Zainab
    Al-Fahaidy, Farouk
    Nagi, Gawed
    Ghallab, Abdullatif
    Alameri, Abdu
    APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2024, 2024
  • [38] Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models
    Casajus-Setien, Jorge
    Bielza, Concha
    Larranaga, Pedro
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 72 - 77
  • [39] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +
  • [40] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832