Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems (2405.18624v1)
Abstract: Protecting Internet of things (IoT) devices against cyber attacks is imperative owing to inherent security vulnerabilities. These vulnerabilities can include a spectrum of sophisticated attacks that pose significant damage to both individuals and organizations. Employing robust security measures like intrusion detection systems (IDSs) is essential to solve these problems and protect IoT systems from such attacks. In this context, our proposed IDS model consists on a combination of convolutional neural network (CNN) and long short-term memory (LSTM) deep learning (DL) models. This fusion facilitates the detection and classification of IoT traffic into binary categories, benign and malicious activities by leveraging the spatial feature extraction capabilities of CNN for pattern recognition and the sequential memory retention of LSTM for discerning complex temporal dependencies in achieving enhanced accuracy and efficiency. In assessing the performance of our proposed model, the authors employed the new CICIoT2023 dataset for both training and final testing, while further validating the model's performance through a conclusive testing phase utilizing the CICIDS2017 dataset. Our proposed model achieves an accuracy rate of 98.42%, accompanied by a minimal loss of 0.0275. False positive rate(FPR) is equally important, reaching 9.17% with an F1-score of 98.57%. These results demonstrate the effectiveness of our proposed CNN-LSTM IDS model in fortifying IoT environments against potential cyber threats.
- M. Roopak, G. Y. Tian, and J. Chambers, “Deep learning models for cyber security in iot networks,” in 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, 2019, pp. 0452–0457.
- ——, “An intrusion detection system against ddos attacks in iot networks,” in 2020 10th annual computing and communication workshop and conference (CCWC). IEEE, 2020, pp. 0562–0567.
- M. Haggag, M. M. Tantawy, and M. M. El-Soudani, “Implementing a deep learning model for intrusion detection on apache spark platform,” IEEE Access, vol. 8, pp. 163 660–163 672, 2020.
- K. Albulayhi, A. A. Smadi, F. T. Sheldon, and R. K. Abercrombie, “IoT intrusion detection taxonomy, reference architecture, and analyses,” Sensors, vol. 21, no. 19, p. 6432, 2021.
- R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep learning approach for intelligent intrusion detection system,” Ieee Access, vol. 7, pp. 41 525–41 550, 2019.
- P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges,” computers & security, vol. 28, no. 1-2, pp. 18–28, 2009.
- H. Kheddar, Y. Himeur, and A. I. Awad, “Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review,” Journal of Network and Computer Applications, vol. 220, p. 103760, 2023.
- M. F. Elrawy, A. I. Awad, and H. F. Hamed, “Intrusion detection systems for iot-based smart environments: a survey,” Journal of Cloud Computing, vol. 7, no. 1, pp. 1–20, 2018.
- P. R. Kanna and P. Santhi, “Unified deep learning approach for efficient intrusion detection system using integrated spatial–temporal features,” Knowledge-Based Systems, vol. 226, p. 107132, 2021.
- Y. Habchi, Y. Himeur, H. Kheddar, A. Boukabou, S. Atalla, A. Chouchane, A. Ouamane, and W. Mansoor, “AI in thyroid cancer diagnosis: Techniques, trends, and future directions,” Systems, vol. 11, no. 10, p. 519, 2023.
- H. Kheddar, D. Megias, and M. Bouzid, “Fourier magnitude-based steganography for hiding 2.4 kbps MELP secret speech,” in 2018 International Conference on Applied Smart Systems (ICASS). IEEE, 2018, pp. 1–5.
- N. Djeffal, D. Addou, H. Kheddar, and S. A. Selouani, “Noise-robust speech recognition: A comparative analysis of LSTM and CNN approaches,” in 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), vol. 1. IEEE, 2023, pp. 1–6.
- H. Kheddar, M. Hemis, Y. Himeur, D. Megías, and A. Amira, “Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions,” Neurocomputing, p. 127528, 2024.
- H. Kheddar and D. Megías, “High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding,” Applied Intelligence, vol. 52, no. 8, pp. 9441–9459, 2022.
- M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, “Selection of effective machine learning algorithm and bot-iot attacks traffic identification for internet of things in smart city,” Future Generation Computer Systems, vol. 107, pp. 433–442, 2020.
- A. Binbusayyis and T. Vaiyapuri, “Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM,” Applied Intelligence, vol. 51, no. 10, pp. 7094–7108, 2021.
- O. Ibitoye, O. Shafiq, and A. Matrawy, “Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks,” in 2019 IEEE global communications conference (GLOBECOM). IEEE, 2019, pp. 1–6.
- N. Chouhan, A. Khan et al., “Network anomaly detection using channel boosted and residual learning based deep convolutional neural network,” Applied Soft Computing, vol. 83, p. 105612, 2019.
- A. Gueriani, H. Kheddar, and A. C. Mazari, “Deep reinforcement learning for intrusion detection in IoT: A survey,” in 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), vol. 1. IEEE, 2023, pp. 1–7.
- H. Kheddar, Y. Himeur, S. Al-Maadeed, A. Amira, and F. Bensaali, “Deep transfer learning for automatic speech recognition: Towards better generalization,” Knowledge-Based Systems, vol. 277, p. 110851, 2023.
- A. Kim, M. Park, and D. H. Lee, “Ai-ids: Application of deep learning to real-time web intrusion detection,” IEEE Access, vol. 8, pp. 70 245–70 261, 2020.
- S. S. S. Sugi and S. R. Ratna, “Investigation of machine learning techniques in intrusion detection system for iot network,” in 2020 3rd international conference on intelligent sustainable systems (ICISS). IEEE, 2020, pp. 1164–1167.
- M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, and G. Fortino, “A hybrid deep learning model for efficient intrusion detection in big data environment,” Information Sciences, vol. 513, pp. 386–396, 2020.
- W. Yao, H. Zhao, and H. Shi, “Privacy-preserving collaborative intrusion detection in edge of internet of things: A robust and efficient deep generative learning approach,” IEEE Internet of Things Journal, 2023.
- S. Abbas, I. Bouazzi, S. Ojo, A. Al Hejaili, G. A. Sampedro, A. Almadhor, and M. Gregus, “Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks,” PeerJ Computer Science, vol. 10, p. e1793, 2024.
- H. Kheddar, M. Hemis, and Y. Himeur, “Automatic speech recognition using advanced deep learning approaches: A survey,” Information Fusion, p. 102422, 2024.
- Y. Habchi, H. Kheddar, Y. Himeur, A. Boukabou, A. Chouchane, A. Ouamane, S. Atalla, and W. Mansoor, “Machine learning and vision transformers for thyroid carcinoma diagnosis: A review,” arXiv preprint arXiv:2403.13843, 2024.
- N. Djeffal, H. Kheddar, D. Addou, A. C. Mazari, and Y. Himeur, “Automatic speech recognition with BERT and CTC transformers: A review,” in 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), vol. 1. IEEE, 2023, pp. 1–8.