Skip to main content

Deep Learning-Based Solution for Intrusion Detection in the Internet of Things

  • Conference paper
  • First Online:
Computational Intelligence and Network Systems (CINS 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1978))

  • 65 Accesses

Abstract

Securing the Internet of Things-based environment is a top priority for consumers, businesses, and governments. There are billions of devices connecting and sharing data; an attack might cost billions of dollars. As a result, it’s important to protect the IoT network from external and internal threats. There is no way to guarantee that all vulnerabilities will be fixed with a single solution or that no additional flaws will be discovered. This paper proposes a deep learning-based solution to detect network intrusion in an IoT network to better prepare for network attacks. The proposed solution achieves the optimal tradeoff between accuracy and model weightage and ensures it is well-suited for resource-constrained IoT devices. The proposed solution uses a reduced data set for training produced by incremental PCA with LSTM, GRU, and BiLSTM. The proposed solution reduced the training time significantly while retaining the accuracy of 98.17% with GRU, 98.12% with LSTM, and 98.23% with BiLSTM, and the results show that the proposed model has better performance in training the model for detecting network intrusion in an IoT network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashraf, J., Bakhshi, A.D., Moustafa, N., Khurshid, H., Javed, A., Beheshti, A.: Novel deep learning-enabled lstm autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 22(7), 4507–4518 (2021). https://doi.org/10.1109/TITS.2020.3017882

    Article  Google Scholar 

  2. Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimedia Tools Appli. 80(16), 24147–24171 (2021)

    Article  Google Scholar 

  3. ElSayed, M.S., Le-Khac, N.A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021)

    Article  Google Scholar 

  4. Hai, T.H., Nam, L.H.: A practical comparison of deep learning methods for network intrusion detection. In: 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1–6 (2021). https://doi.org/10.1109/ICECCE52056.2021.9514161

  5. Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.N., Bayne, E., Bellekens, X.: Utilising deep learning techniques for effective zero-day attack detection. Electronics 9(10), 1684 (2020)

    Article  Google Scholar 

  6. Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional lstm deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)

    Article  Google Scholar 

  7. Joshi, C., Ranjan, R.K., Bharti, V.: A fuzzy logic based feature engineering approach for botnet detection using ann. J. King Saud University-Comput. Informat. Sci. (2021)

    Google Scholar 

  8. Kostadinov, S.: Understanding gru network. https://towardsdatascience.com/understanding-gru-networks-2ef37df6c9be (Accessed 24 June 2022)

  9. Krimmling, J., Peter, S.: Integration and evaluation of intrusion detection for coap in smart city applications. In: 2014 IEEE Conference on Communications and Network Security, pp. 73–78. IEEE (2014)

    Google Scholar 

  10. Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (lstm). J. Big Data 8(1), 1–16 (2021)

    Article  Google Scholar 

  11. Latif, S., Idrees, Z., Zou, Z., Ahmad, J.: Drann: a deep random neural network model for intrusion detection in industrial iot. In: 2020 International Conference on UK-China Emerging Technologies (UCET), pp. 1–4 (2020). https://doi.org/10.1109/UCET51115.2020.9205361

  12. Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231–48246 (2018)

    Article  Google Scholar 

  13. Parimala, G., Kayalvizhi, R.: An effective intrusion detection system for securing iot using feature selection and deep learning. In: 2021 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–4 (2021). https://doi.org/10.1109/ICCCI50826.2021.9402562

  14. Pooja, T., Shrinivasacharya, P.: Evaluating neural networks using bi-directional lstm for network ids (intrusion detection systems) in cyber security. Global Trans. Proc. 2(2), 448–454 (2021)

    Article  Google Scholar 

  15. Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using cnn. Soft. Comput. 24(22), 17265–17278 (2020)

    Article  Google Scholar 

  16. Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)

    Article  Google Scholar 

  17. Ullah, I., Mahmoud, Q.H.: Design and development of rnn anomaly detection model for iot networks. IEEE Access 10, 62722–62750 (2022). https://doi.org/10.1109/ACCESS.2022.3176317

    Article  Google Scholar 

  18. Wang, H., Barriga, L., Vahidi, A., Raza, S.: Machine learning for security at the iot edge - a feasibility study. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 7–12 (2019). https://doi.org/10.1109/MASSW.2019.00009

  19. Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210–42219 (2019). https://doi.org/10.1109/ACCESS.2019.2904620

    Article  Google Scholar 

  20. Zhang, Y., Li, P., Wang, X.: Intrusion detection for iot based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019). https://doi.org/10.1109/ACCESS.2019.2903723

    Article  Google Scholar 

  21. Zhao, J.W., et al.: Method of choosing optimal features used to intrusion detection system in coal mine disaster warning internet of things based on immunity algorithm. Vet. Clin. Pathol: A Case-Based Approach, 157 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akhil Chaurasia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaurasia, A., Mishra, A., Rao, U.P., Kumar, A. (2024). Deep Learning-Based Solution for Intrusion Detection in the Internet of Things. In: Muthalagu, R., P S, T., Pawar, P.M., R, E., Prasad, N.R., Fiorentino, M. (eds) Computational Intelligence and Network Systems. CINS 2023. Communications in Computer and Information Science, vol 1978. Springer, Cham. https://doi.org/10.1007/978-3-031-48984-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-48984-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-48983-9

  • Online ISBN: 978-3-031-48984-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics