An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm
Received: 27 April 2024 | Revised: 12 June 2024 | Accepted: 15 June 2024 | Online: 9 October 2024
Corresponding author: Rusul H. Altaie
Abstract
Cybercriminals are interested in the Internet of Things (IoT) more than ever due to its remarkable growth pace. This assertion is supported by the growing number of cyberattacks on IoT devices and intermediary communication mediums. IoT attacks that go unnoticed for a long time can result in serious service disruptions and monetary losses. Real-time intrusion detection on IoT devices is necessary to ensure the dependability, security, and profitability of IoT-enabled services. This study proposes a lightweight deep-learning method for detecting intrusions in IoT devices. The proposed system uses a hybrid Convolution Neural Network (CNN) with Long Short Term Memory (LSTM). Three distinct models, CNN, LSTM, and the proposed hybrid CNN+LSTM were used to identify intrusions in the UNSW-NB15 dataset. The proposed hybrid model was used to identify event characteristics on a Raspberry Pi3 device. To minimize computation costs, CNN and LSTM were stacked without the final layer to maximize convergence speed. CNN and LSTM layers are mapped to the sample marker space using fully linked layers and a softmax layer. The average accuracy, recall, precision, and F1-score of the proposed hybrid intrusion detection system were 98.78%, 98.09%, 97.88%, and 97.99%, respectively.
Keywords:
Convolutional Neural Network (CNN), Deep Learning (DL), Intrusion Detection System (IDS), Internet of Things (IoT), Long Short-Term Memory (LSTM)Downloads
References
D. K. Singh and M. Shrivastava, "Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7130–7134, Jun. 2021.
M. Anwer, S. M. Khan, M. U. Farooq, and Waseemullah, "Attack Detection in IoT using Machine Learning," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7273–7278, Jun. 2021.
R. H. Altaie and H. K. Hoomod, "Artificial Intelligent Management for Internet of Things: A Review," in 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA), Baghdad, Iraq, Dec. 2022, pp. 179–184.
Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, "A bidirectional LSTM deep learning approach for intrusion detection," Expert Systems with Applications, vol. 185, Dec. 2021, Art. no. 115524.
A. Awajan, "A Novel Deep Learning-Based Intrusion Detection System for IoT Networks," Computers, vol. 12, no. 2, Feb. 2023, Art. no. 34.
S. Choudhary and N. Kesswani, "Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT," Procedia Computer Science, vol. 167, pp. 1561–1573, Jan. 2020.
P. More and P. Mishra, "Enhanced-PCA based Dimensionality Reduction and Feature Selection for Real-Time Network Threat Detection," Engineering, Technology & Applied Science Research, vol. 10, no. 5, pp. 6270–6275, Oct. 2020.
R. Alsulami, B. Alqarni, R. Alshomrani, F. Mashat, and T. Gazdar, "IoT Protocol-Enabled IDS based on Machine Learning," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12373–12380, Dec. 2023.
S. Smys, A. Basar, and H. Wang, "Hybrid Intrusion Detection System for Internet of Things (IoT)," Journal of IoT in Social, Mobile, Analytics, and Cloud, vol. 2, no. 4, pp. 190–199, Sep. 2020.
B. K. Park and C. J. Kim, "Unsteady Heat Flux Measurement and Predictions Using Long Short-Term Memory Networks," Buildings, vol. 13, no. 3, Mar. 2023, Art. no. 707.
M. A. Alsoufi et al., "Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review," Applied Sciences, vol. 11, no. 18, Jan. 2021, Art. no. 8383.
Y. Slimani and R. Hedjam, "A Hybrid Metaheuristic and Deep Learning Approach for Change Detection in Remote Sensing Data," Engineering, Technology & Applied Science Research, vol. 12, no. 5, pp. 9351–9356, Oct. 2022.
M. Al-Hawawreh, E. Sitnikova, and N. Aboutorab, "X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things," IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3962–3977, Mar. 2022.
M. Al-Hawawreh, E. Sitnikova, and N. Aboutorab, "Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT," IEEE Access, vol. 9, pp. 148738–148755, 2021.
Z. Xu, Y. Guo, C. Chakraborty, Q. Hua, S. Chen, and K. Yu, "A Simple Federated Learning-Based Scheme for Security Enhancement Over Internet of Medical Things," IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 652–663, Oct. 2023.
M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani, "IoT malicious traffic identification using wrapper-based feature selection mechanisms," Computers & Security, vol. 94, Jul. 2020, Art. no. 101863.
Downloads
How to Cite
License
Copyright (c) 2024 Rusul H. Jalem, Haider K. Hoomod
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.