[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Logo PTI Logo FedCSIS

Position Papers of the 19th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 40

Resource efficient Internet-of-Things intrusion detection with spiking neural networks

,

DOI: http://dx.doi.org/10.15439/2024F8800

Citation: Position Papers of the 19th Conference on Computer Science and Intelligence Systems, M. Bolanowski, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 40, pages 7378 ()

Full text

Abstract. Spiking neural networks are a novel implementation of artificial neural networks that is closely based on neurobiology. We created a spiking neural network classifier in PyTorch and snn-torch based on Leaky Integrate-and-Fire neurons that managed to get F1 score of 0.957 on 10 000 samples of BoT-IoT dataset and 240 hidden spiking neurons. Training was performed on CPU for 300 epochs and 10 simulation steps per epoch, utilizing Adam optimizer, cross-entropy loss and back-propagation as a learning algorithm. Lowering hidden spiking neuron count from 240 to 72 and sample size from 10 000 to 1 000 we were able to optimize training time by 84\% and testing time by 57\% while having F1 score of 0.944. Loss, Receiver Operating Characteristic and Precision Recall curves are shown for the two experiments, as well as summarized data for additional performed experiments with different sample sizes and neuron counts. We conclude that spiking neural networks for intrusion detection represent a viable solution for training and classification on resource constrained devices with limited samples. Further research steps are presented with the goal of improving performance.

References

  1. S. Li, L. D. Xu, and S. Zhao, “The internet of things: a survey,” vol. 17, no. 2, pp. 243–259.
  2. “Annual number of IoT attacks global 2022.”
  3. D. Denning, “An intrusion-detection model,” vol. SE-13, no. 2, pp. 222–232.
  4. T. Lunt, “Real-time intrusion detection,” pp. 348–353. Conference Name: Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage ISBN: 9780818619090 Place: San Francisco, CA, USA Publisher: IEEE Comput. Soc. Press.
  5. S. Shieh and V. Gligor, “A pattern-oriented intrusion-detection model and its applications,” pp. 327–342. Conference Name: 1991 IEEE Computer Society Symposium on Research in Security and Privacy ISBN: 9780818621680 Place: Oakland, CA, USA Publisher: IEEE Comput. Soc. Press.
  6. Wenke Lee, S. Stolfo, and K. Mok, “A data mining framework for
  7. building intrusion detection models,” pp. 120–132. Conference Name: 1999 IEEE Symposium on Security and Privacy ISBN: 9780769501765
  8. Place: Oakland, CA, USA Publisher: IEEE Comput. Soc.
  9. C. A. Mead, “Neuromorphic electronic systems,” vol. 78, no. 10, pp. 1629–1636. MAG ID: 2163630896 S2ID: 459c554583c9a2f70dd36e84149989fde1e9f833.
  10. E. Izhikevich, “Simple model of spiking neurons,” vol. 14, no. 6, pp. 1569–1572.
  11. A. L. Hodgkin and A. F. Huxley, “A quantitative description of membrane current and its application to conduction and excitation in nerve,” vol. 117, no. 4, pp. 500–544. MAG ID: 1985940938.
  12. K. F. Bonhoeffer, “Activation of passive iron as a model for the excitation of nerve.,” vol. 32, no. 1, pp. 69–91. MAG ID: 2019082810 S2ID: d4a34157d41b45efe5622fb11d29995ed0f26b82.
  13. B. van der Pol Jun Docts. Sc. and J. van der Mark, “LXXII. the heartbeat considered as a relaxation oscillation, and an electrical model of the heart,” vol. 6, no. 38, pp. 763–775. MAG ID: 2071313546 S2ID: 9de0580210474428aee2312db59263647c568337.
  14. J. J. Hopfield, “Neural networks and physical systems with emergent collective computational abilities,” vol. 79, no. 8, pp. 2554–2558. MAG ID: 2128084896.
  15. F. Akopyan, J. Sawada, A. Cassidy, R. Alvarez-Icaza, J. Arthur, P. Merolla, N. Imam, Y. Nakamura, P. Datta, G.-J. Nam, B. Taba, M. Beakes, B. Brezzo, J. B. Kuang, R. Manohar, W. P. Risk, B. Jackson, and D. S. Modha, “TrueNorth: Design and tool flow of a 65 mW 1 million neuron programmable neurosynaptic chip,” vol. 34, no. 10, pp. 1537–1557. Conference Name: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
  16. M. S. Asghar, S. Arslan, and H. Kim, “A low-power spiking neural network chip based on a compact LIF neuron and binary exponential charge injector synapse circuits,” vol. 21, no. 13, p. 4462.
  17. S. Kim, S. Park, B. Na, and S. Yoon, “Spiking-YOLO: Spiking neural network for energy-efficient object detection,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 11270–11277. ISSN: 2374-3468, 2159-5399 Issue: 07 Journal Abbreviation: AAAI.
  18. S. Song, K. D. Miller, L. F. Abbott, and L. F. Abbott, “Competitive hebbian learning through spike-timing-dependent synaptic plasticity,” vol. 3, no. 9, pp. 919–926. MAG ID: 1486852018.
  19. T. P. Lillicrap, A. Santoro, L. Marris, C. J. Akerman, and G. Hinton, “Backpropagation and the brain,” vol. 21, no. 6, pp. 335–346.
  20. T. Wang, G. Zhang, H. Rong, and M. J. Pérez-Jiménez, “Application of fuzzy reasoning spiking neural p systems to fault diagnosis,” vol. 9, no. 6, p. 786.
  21. Z. Alom and T. M. Taha, “Network intrusion detection for cyber security using unsupervised deep learning approaches,” pp. 63–69. MAG ID: 2790100928.
  22. S. Zhou, Shibo Zhou, Shibo Zhou, Xiaohua Li, Xiaohua Li, and X. Li, “Spiking neural networks with single-spike temporal-coded neurons for network intrusion detection.,” ARXIV ID: 2010.07803 MAG ID: 3093177876 S2ID: 70586ad226b9671b8c461f465850eff194eb726f.
  23. A. Zarzoor, N. Adnan, N. Al-Jamali, and D. Aldaloo, “Intrusion detection method for internet of things based on the spiking neural network and decision tree method,” vol. 13, pp. 2278–2288.
  24. K. Hassini, S. Khalis, O. Habibi, M. Chemmakha, and M. Lazaar, “An end-to-end learning approach for enhancing intrusion detection in industrial-internet of things,” vol. 294, p. 111785.
  25. N. Koroniotis, N. Moustafa, F. Schiliro, P. Gauravaram, and H. Janicke, “A holistic review of cybersecurity and reliability perspectives in smart airports,” vol. 8, pp. 209802–209834. Conference Name: IEEE Access.
  26. N. Koroniotis and N. Moustafa, “Enhancing network forensics with particle swarm and deep learning: The particle deep framework.”
  27. N. Koroniotis, N. Moustafa, and E. Sitnikova, “A new network forensic framework based on deep learning for internet of things networks: A particle deep framework,” vol. 110, pp. 91–106.
  28. N. Koroniotis, N. Moustafa, E. Sitnikova, and J. Slay, “Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques,” in Mobile Networks and Management (J. Hu, I. Khalil, Z. Tari, and S. Wen, eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 30–44, Springer International Publishing.
  29. N. Koroniotis, “Designing an effective network forensic framework for the investigation of botnets in the internet of things.”
  30. D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization.” D. R. Cox, “The regression analysis of binary sequences,” vol. 20, no. 2, pp. 215–242. Publisher: [Royal Statistical Society, Wiley]. M. Davies, N. Srinivasa, T.-H. Lin, G. Chinya, Y. Cao, S. H. Choday, G. Dimou, P. Joshi, N. Imam, S. Jain, Y. Liao, C.-K. Lin, A. Lines, R. Liu, D. Mathaikutty, S. McCoy, A. Paul, J. Tse, G. Venkataramanan, Y.-H. Weng, A. Wild, Y. Yang, and H. Wang, “Loihi: A neuromorphic manycore processor with on-chip learning,” vol. 38, no. 1, pp. 82–99.