Abstract
Securing the Internet of Things-based environment is a top priority for consumers, businesses, and governments. There are billions of devices connecting and sharing data; an attack might cost billions of dollars. As a result, it’s important to protect the IoT network from external and internal threats. There is no way to guarantee that all vulnerabilities will be fixed with a single solution or that no additional flaws will be discovered. This paper proposes a deep learning-based solution to detect network intrusion in an IoT network to better prepare for network attacks. The proposed solution achieves the optimal tradeoff between accuracy and model weightage and ensures it is well-suited for resource-constrained IoT devices. The proposed solution uses a reduced data set for training produced by incremental PCA with LSTM, GRU, and BiLSTM. The proposed solution reduced the training time significantly while retaining the accuracy of 98.17% with GRU, 98.12% with LSTM, and 98.23% with BiLSTM, and the results show that the proposed model has better performance in training the model for detecting network intrusion in an IoT network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashraf, J., Bakhshi, A.D., Moustafa, N., Khurshid, H., Javed, A., Beheshti, A.: Novel deep learning-enabled lstm autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 22(7), 4507–4518 (2021). https://doi.org/10.1109/TITS.2020.3017882
Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimedia Tools Appli. 80(16), 24147–24171 (2021)
ElSayed, M.S., Le-Khac, N.A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021)
Hai, T.H., Nam, L.H.: A practical comparison of deep learning methods for network intrusion detection. In: 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1–6 (2021). https://doi.org/10.1109/ICECCE52056.2021.9514161
Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.N., Bayne, E., Bellekens, X.: Utilising deep learning techniques for effective zero-day attack detection. Electronics 9(10), 1684 (2020)
Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)
Joshi, C., Ranjan, R.K., Bharti, V.: A fuzzy logic based feature engineering approach for botnet detection using ann. J. King Saud University-Comput. Informat. Sci. (2021)
Kostadinov, S.: Understanding gru network. https://towardsdatascience.com/understanding-gru-networks-2ef37df6c9be (Accessed 24 June 2022)
Krimmling, J., Peter, S.: Integration and evaluation of intrusion detection for coap in smart city applications. In: 2014 IEEE Conference on Communications and Network Security, pp. 73–78. IEEE (2014)
Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (lstm). J. Big Data 8(1), 1–16 (2021)
Latif, S., Idrees, Z., Zou, Z., Ahmad, J.: Drann: a deep random neural network model for intrusion detection in industrial iot. In: 2020 International Conference on UK-China Emerging Technologies (UCET), pp. 1–4 (2020). https://doi.org/10.1109/UCET51115.2020.9205361
Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)
Parimala, G., Kayalvizhi, R.: An effective intrusion detection system for securing iot using feature selection and deep learning. In: 2021 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4 (2021). https://doi.org/10.1109/ICCCI50826.2021.9402562
Pooja, T., Shrinivasacharya, P.: Evaluating neural networks using bi-directional lstm for network ids (intrusion detection systems) in cyber security. Global Trans. Proc. 2(2), 448–454 (2021)
Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using cnn. Soft. Comput. 24(22), 17265–17278 (2020)
Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)
Ullah, I., Mahmoud, Q.H.: Design and development of rnn anomaly detection model for iot networks. IEEE Access 10, 62722–62750 (2022). https://doi.org/10.1109/ACCESS.2022.3176317
Wang, H., Barriga, L., Vahidi, A., Raza, S.: Machine learning for security at the iot edge - a feasibility study. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 7–12 (2019). https://doi.org/10.1109/MASSW.2019.00009
Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210–42219 (2019). https://doi.org/10.1109/ACCESS.2019.2904620
Zhang, Y., Li, P., Wang, X.: Intrusion detection for iot based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019). https://doi.org/10.1109/ACCESS.2019.2903723
Zhao, J.W., et al.: Method of choosing optimal features used to intrusion detection system in coal mine disaster warning internet of things based on immunity algorithm. Vet. Clin. Pathol: A Case-Based Approach, 157 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chaurasia, A., Mishra, A., Rao, U.P., Kumar, A. (2024). Deep Learning-Based Solution for Intrusion Detection in the Internet of Things. In: Muthalagu, R., P S, T., Pawar, P.M., R, E., Prasad, N.R., Fiorentino, M. (eds) Computational Intelligence and Network Systems. CINS 2023. Communications in Computer and Information Science, vol 1978. Springer, Cham. https://doi.org/10.1007/978-3-031-48984-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-48984-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48983-9
Online ISBN: 978-3-031-48984-6
eBook Packages: Computer ScienceComputer Science (R0)