International Journal of Cryptocurrency Research
|
Volume 2, Issue 1, June 2022 | |
Research PaperOpenAccess | |
Optimization Model for Intrusion Detection System in IoT Applications |
|
Abeer. Y.A. Salawi1 and Mohammed. I. Alghamdi2* |
|
1College of Computer Science and Information Technology, Department of Engineering and Computer Sciences, Al-Baha University,, Al-Baha City, Kingdom of Saudi Arabia E-mail: 442020222@stu.bu.edu.sa
*Corresponding Author | |
Int.J.Cryp.Curr.Res. 2(1) (2022) 41-51, DOI: https://doi.org/10.51483/IJCCR.2.1.2022.41-51 | |
Received: 19/04/2022|Accepted: 22/05/2022|Published: 05/06/2022 |
In the era of the Internet of Things (IoT), connected objects produce an enormous amount of data traffic that feed big data analytics, which could be used in discovering unseen patterns and identifying anomalous traffic. In this paper, we identify five key design principles that should be considered when developing a deep learning-based Intrusion Detection System (IDS) for the IoT. Based on these principles, we design and implement Temporal Convolution Neural Network (TCNN), a deep learning framework for intrusion detection systems in IoT, which combines Convolution Neural Network (CNN) with causal convolution. TCNN is combined with Synthetic Minority Oversampling Technique-Nominal Continuous (SMOTE-NC) to handle unbalanced dataset. It is also combined with efficient feature engineering techniques, which consist of feature space reduction and feature transformation. TCNN is evaluated on Bot-IoT dataset and compared with two common machine learning algorithms, i.e., Logistic Regression (LR) and CNN. Experimental results show that TCNN achieves a good trade-off between effectiveness and efficiency. It outperforms the state-of-the-art deep learning IDSs that are tested on Bot-IoT dataset and records an accuracy of 99.9986% for multiclass traffic detection and shows a very close performance to CNN with respect to the training time.
Keywords: Cascade Forward Neural Network, Internet of things, Intrusion Detection System, Metaheuristics, Political Optimizer, Neural Network
Full text | Download |
Copyright © SvedbergOpen. All rights reserved