[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3603781.3603882acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection

Published: 27 July 2023 Publication History

Abstract

The Internet of Things (IoT) is under attack with the spread of IoT device applications. Traffic anomaly detection is critical to ensure IoT security. This paper proposes a method for abnormal traffic detection in IoT based on random forest and cascade deep learning detection model. IoT device traffic data were analyzed by random forest algorithm to screen out feature parameters with significant relevance to the detection target. To detect abnormal traffic, the feature parameters were taken as the input of convolution neural network (CNN) and long short-term memory (LSTM) detection models and to compare and analyze different dimensions, classification methods, and algorithmic model approaches. The results show that the detection accuracy reached 99.98% in dichotomous classification and 88.14% in multi-classification for high-dimensional data. The proposed CNN and LSTM cascade model detection methods were more stable than CNN and LSTM methods. Additionally, the model solved the problem of high dimensionality and nonlinearity of a large number of parameters to ensure that the main characteristics of the input variables were remembered over time. Therefore, the detection accuracy of this hybrid model is more desirable than that of the CNN and LSTM models without feature selection.

References

[1]
Global System for Mobile Communications assembly. The Mobile Economy 2020[EB/OL].(2020-03)[2022-06-01].https://www.gsma.com/mobileeconomy/wp-content/uploads/2020/03/GSMA_MobileEconomy2020_Global.pdf
[2]
Nadav Liebermann. SAM Seamless Network. 2021 IoTSecurity Landscape [EB/OL].(2021-04-07)[2022-06-01]. https://securingsam.com/2021-iot-security-landscape/
[3]
Alasmary H, Khormali A, Anwar A, Analyzing and detecting emerging internet of things malware: A graph-based approach[J]. IEEE Internet of Things Journal, 2019, 6(5): 8977-8988.
[4]
Shen Su, Yanbin Sun, Xiangsong Gao, Jing Qiu, Zhihong Tian. A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection[J]. Applied Sciences, 2019, 9(3).
[5]
M.Y.Su, K.C.Chang, H.F.Wei, and C.Y.Lin. Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN[J]. Intelligence and Security Informatics, vol.5075, June.2008.195-204.
[6]
BREIMAN L. Random forests[J]. Machine Learning, 2001, 45(1): 5-32.
[7]
Lecun Y, Boser B, Denker J S, Backpropagation Applied to Handwritten Zip Code Recognition[J]. Neural Computation, 2014, 1(4):541-551.
[8]
Lecun Y, Kavukcuoglu K, Cle´ment Farabet. Convolutional Networks and Applications in Vision[C]. Proceedings of 2010 IEEE International Symposium on Circuits and Systems. IEEE, 2010: 253-256.
[9]
Graves A. Long Short-Term Memory[M]. Supervised Sequence Labelling with Recurrent Neural Networks. 2012.
[10]
Hochreiter S, Schmidhuber J. Longshort–term memory[J].Neural computation,1997,9(8):1735–1780.
[11]
Shalev-Shwartz S, Ben-David S. Understanding machine learning: From theory to lgorithms[M]. New York: Cambridge University Press, 2014.
[12]
Li, X., Chen, W., Zhang, Q., & Wu, L. (2020). Building auto-encoder intrusion detection system based on random forest feature selection. Computers & Security, 95, 101851.
[13]
JIANG G Q, XIE P, HE H B, Wind turbine fault detection using denoising autoencoder with temporal information[J]. IEEE / ASME Transactions on Mechatronics, 2017, 23(1) : 89-100.
[14]
Reza, S., Ferreira, M. C., Machado, J. J. M., & Tavares, J. M. R. (2022). A multi-head attention-based transformer model for traffic flow forecasting with a comparative analysis to recurrent neural networks. Expert Systems with Applications, 202, 117275.
[15]
Meidan Y, Bohadana M, Mathov Y, N-BaIoT-Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders[J]. IEEE Pervasive Computing, 2018, 17(3): 12-22

Index Terms

  1. Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CNIOT '23: Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things
    May 2023
    1025 pages
    ISBN:9798400700705
    DOI:10.1145/3603781
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CNIOT'23

    Acceptance Rates

    Overall Acceptance Rate 39 of 82 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 46
      Total Downloads
    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media