Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems (2312.02490v1)
Abstract: Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face inherent challenges of IoT systems, including the heterogeneity of IoT data/devices, the high dimensionality of training data, and the imbalanced data. Moreover, the deployment of IDSs on IoT systems is challenging, and sometimes impossible, due to the limited resources such as memory/storage and computing capability of typical IoT devices. To tackle these challenges, this article proposes a novel deep neural network/architecture called Constrained Twin Variational Auto-Encoder (CTVAE) that can feed classifiers of IDSs with more separable/distinguishable and lower-dimensional representation data. Additionally, in comparison to the state-of-the-art neural networks used in IDSs, CTVAE requires less memory/storage and computing power, hence making it more suitable for IoT IDS systems. Extensive experiments with the 11 most popular IoT botnet datasets show that CTVAE can boost around 1% in terms of accuracy and Fscore in detection attack compared to the state-of-the-art machine learning and representation learning methods, whilst the running time for attack detection is lower than 2E-6 seconds and the model size is lower than 1 MB. We also further investigate various characteristics of CTVAE in the latent space and in the reconstruction representation to demonstrate its efficacy compared with current well-known methods.
- L. Yang, A. Moubayed, and A. Shami, “Mth-ids: A multitiered hybrid intrusion detection system for internet of vehicles,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 616–632, Jan. 2021.
- S. I. Popoola, B. Adebisi, M. Hammoudeh, G. Gui, and H. Gacanin, “Hybrid deep learning for botnet attack detection in the internet-of-things networks,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4944–4956, Oct. 2020.
- P. Xanthopoulos, P. M. Pardalos, T. B. Trafalis, P. Xanthopoulos, P. M. Pardalos, and T. B. Trafalis, “Linear discriminant analysis,” Robust data mining, pp. 27–33, Jan. 2013.
- I. Ullah and Q. H. Mahmoud, “Design and development of a deep learning-based model for anomaly detection in iot networks,” IEEE Access, vol. 9, pp. 103 906–103 926, Jul. 2021.
- G. Abdelmoumin, D. B. Rawat, and A. Rahman, “On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things,” IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280–4290, Aug. 2021.
- S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, “Intrusion detection systems in the internet of things: A comprehensive investigation,” Computer Networks, vol. 160, pp. 165–191, Sept. 2019.
- A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, pp. 1–22, Jul. 2019.
- M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 50, no. 1, p. 102419, 2020.
- Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 8, pp. 1798–1828, Mar. 2013.
- T.-N. Dao and H. Lee, “Stacked autoencoder-based probabilistic feature extraction for on-device network intrusion detection,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14 438–14 451, Aug. 2022.
- J. Sun, X. Wang, N. Xiong, and J. Shao, “Learning sparse representation with variational auto-encoder for anomaly detection,” IEEE Access, vol. 6, pp. 33 353–33 361, Jun. 2018.
- L. Vu, V. L. Cao, Q. U. Nguyen, D. N. Nguyen, D. T. Hoang, and E. Dutkiewicz, “Learning latent representation for iot anomaly detection,” IEEE Transactions on Cybernetics, pp. 1–14, Sept. 2020.
- J. Tomczak and M. Welling, “Vae with a vampprior,” in International Conference on Artificial Intelligence and Statistics. Playa Blanca, Lanzarote, Canary Islands: PMLR, 2018, pp. 1214–1223.
- P. V. Dinh, N. Q. Uy, D. N. Nguyen, D. T. Hoang, S. P. Bao, and E. Dutkiewicz, “Twin variational auto-encoder for representation learning in iot intrusion detection,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC). Austin, TX, USA: IEEE, 2022, pp. 848–853.
- R. Lletı, M. C. Ortiz, L. A. Sarabia, and M. S. Sánchez, “Selecting variables for k-means cluster analysis by using a genetic algorithm that optimises the silhouettes,” Analytica Chimica Acta, vol. 515, no. 1, pp. 87–100, Jul. 2004.
- Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, “N-baiot—network-based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Mar. 2018.
- C. Yin, S. Zhang, J. Wang, and N. N. Xiong, “Anomaly detection based on convolutional recurrent autoencoder for iot time series,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 1, pp. 112–122, Jan. 2020.
- T.-N. Dao and H. Lee, “Stacked autoencoder-based probabilistic feature extraction for on-device network intrusion detection,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14 438–14 451, May 2021.
- W. Luo, J. Li, J. Yang, W. Xu, and J. Zhang, “Convolutional sparse autoencoders for image classification,” IEEE Transactions on Neural Networks and Learning Systems, vol. 29, no. 7, pp. 3289–3294, Jul. 2018.
- M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep learning approach combining sparse autoencoder with svm for network intrusion detection,” IEEE Access, vol. 6, pp. 52 843–52 856, Sept. 2018.
- T. Chen and C. Guestrin, “Xgboost: A scalable tree boosting system,” in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco California USA, 2016, pp. 785–794.
- “Linear support vector machine.” [Online]. Available: https://scikit-learn.org/stable/modules/generated/sklearn.svm.LinearSVC.html.
- “Decision tree.” [Online]. Available: https://scikit-learn.org/stable/modules/generated/sklearn.tree.DecisionTreeClassifier.html.
- “Random forest.” [Online]. Available: https://scikit-learn.org/stable/modules/generated/sklearn.ensemble.RandomForestClassifier.html.
- S. S. S. Sindhu, S. Geetha, and A. Kannan, “Decision tree based light weight intrusion detection using a wrapper approach,” Expert Systems with applications, vol. 39, no. 1, pp. 129–141, Jan. 2012.
- D. Moon, H. Im, I. Kim, and J. H. Park, “Dtb-ids: an intrusion detection system based on decision tree using behavior analysis for preventing apt attacks,” The Journal of supercomputing, vol. 73, no. 7, pp. 2881–2895, Dec. 2017.
- R.-C. Chen, K.-F. Cheng, Y.-H. Chen, and C.-F. Hsieh, “Using rough set and support vector machine for network intrusion detection system,” in 2009 First Asian Conference on Intelligent Information and Database Systems. Dong hoi, Vietnam: IEEE, 2009, pp. 465–470.
- M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad, “Support vector machine and random forest modeling for intrusion detection system (ids),” Journal of Intelligent Learning Systems and Applications, vol. 6, no. 1, Aug. 2014.
- X. Li, W. Chen, Q. Zhang, and L. Wu, “Building auto-encoder intrusion detection system based on random forest feature selection,” Computers & Security, vol. 95, p. 101851, Aug. 2020.
- D. S. Kim, S. M. Lee, and J. S. Park, “Building lightweight intrusion detection system based on random forest,” in International Symposium on Neural Networks. Chengdu, China: Springer, 2006, pp. 224–230.
- T. Chen and C. Guestrin, “Xgboost: A scalable tree boosting system,” in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, United States, 2016, pp. 785–794.
- B. S. Bhati, G. Chugh, F. Al-Turjman, and N. S. Bhati, “An improved ensemble based intrusion detection technique using xgboost,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, p. e4076, Aug. 2021.
- L. Vu, Q. U. Nguyen, D. N. Nguyen, D. T. Hoang, and E. Dutkiewicz, “Deep transfer learning for iot attack detection,” IEEE Access, vol. 8, pp. 107 335–107 344, Jun. 2020.
- P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” Journal of Machine Learning Research, vol. 11, no. 12, pp. 3371–3408, Dec. 2010.
- N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, Feb. 2018.
- G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of data with neural networks,” Science, vol. 313, no. 5786, pp. 504–507, Jul. 2006.
- A. V. Phan, P. N. Chau, M. Le Nguyen, and L. T. Bui, “Automatically classifying source code using tree-based approaches,” Data & Knowledge Engineering, vol. 114, pp. 12–25, Mar. 2018.
- R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. AbuMallouh, “Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic,” IEEE Sensors Letters, vol. 3, no. 1, pp. 1–4, Nov. 2018.
- E. Jang, S. Gu, and B. Poole, “Categorical reparameterization with gumbel-softmax,” in International Conference on Learning Representations, Toulon, France, 2017, pp. 1–12.
- C. P. Burgess, I. Higgins, A. Pal, L. Matthey, N. Watters, G. Desjardins, and A. Lerchner, “Understanding disentangling in beta-vae,” arXiv preprint arXiv:1804.03599, 2018.
- H. Wu and M. Flierl, “Vector quantization-based regularization for autoencoders,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 04, New York, USA, 2020, pp. 6380–6387.
- D. P. Kingma and M. Welling, “An introduction to variational autoencoders,” Foundations and Trends® in Machine Learning, vol. 12, no. 4, p. 307–392, Nov. 2019.
- J. An and S. Cho, “Variational autoencoder based anomaly detection using reconstruction probability,” Special Lecture on IE, vol. 2, no. 1, pp. 1–18, Dec. 2015.
- P. V. Dinh, D. N. Nguyen, D. T. Hoang, N. Q. Uy, S. P. Bao, and E. Dutkiewicz, “Balanced twin auto-encoder for iot intrusion detection,” in GLOBECOM 2022-2022 IEEE Global Communications Conference. Rio de Janeiro, Brazil: IEEE, 2022, pp. 3387–3392.
- H. Zou, T. Hastie, and R. Tibshirani, “Sparse principal component analysis,” Journal of computational and graphical statistics, vol. 15, no. 2, pp. 265–286, Jan. 2006.
- A. Tharwat, T. Gaber, A. Ibrahim, and A. E. Hassanien, “Linear discriminant analysis: A detailed tutorial,” AI Communications, vol. 30, no. 2, pp. 169–190, May 2017.
- I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” ICISSp, vol. 1, pp. 108–116, Jan. 2018.
- N. Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, pp. 1–6.
- “Scikit-learn.” [Online]. Available: https://scikit-learn.org/stable/.
- K. DP and J. Ba, “Adam: A method for stochastic optimization,” in Proc. of the 3rd International Conference for Learning Representations (ICLR), San Diego, California, US, 2015, pp. 1–15.
- X. Glorot and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, vol. 9, Chia Laguna Resort, Sardinia, Italy, 2010, pp. 249–256.
- M. Nicolau, J. McDermott et al., “Learning neural representations for network anomaly detection,” IEEE Transactions on Cybernetics, vol. 49, no. 8, pp. 3074–3087, Jun. 2018.
- J. Park, J. Lee, and D. Sim, “Low-complexity cnn with 1d and 2d filters for super-resolution,” Journal of Real-Time Image Processing, vol. 17, no. 6, pp. 2065–2076, Jun. 2020.
- I. Syarif, A. Prugel-Bennett, and G. Wills, “Svm parameter optimization using grid search and genetic algorithm to improve classification performance,” Telkomnika, vol. 14, no. 4, p. 1502, Apr. 2016.
- B. Shekar and G. Dagnew, “Grid search-based hyperparameter tuning and classification of microarray cancer data,” in 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP). Gangtok, Sikkim, India: IEEE, 2019, pp. 1–8.
- P. Probst, M. N. Wright, and A.-L. Boulesteix, “Hyperparameters and tuning strategies for random forest,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 9, no. 3, p. e1301, Mar. 2019.
- “Make blobs.” [Online]. Available: https://scikit-learn.org/stable/modules/generated/sklearn.datasets.make_blobs.html.