[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3626641.3626672acmotherconferencesArticle/Chapter ViewAbstractPublication PagessietConference Proceedingsconference-collections
research-article

Resource Efficient Intrusion Detection Systems for Internet of Things Using Online Machine-Learning Models

Published: 27 December 2023 Publication History

Abstract

The proliferation of Internet of Things (IoT) technology across diverse domains has led to a surge in both the frequency and diversity of cyber-attacks targeting IoT infrastructures. In response to this escalating security challenge, several machine learning-based Intrusion Detection Systems (IDSs) have been developed. However, the machine-learning models used in IDSs are generally not designed with IoT infrastructure’s resource constraints in mind. In response to that issue, we propose the utilization of online machine learning models to build efficient IDS for IoT. In this study, we present an extensive exploration of the implementation of online machine-learning algorithms to develop efficient IDSs for IoT. To evaluate the performance of the online machine-learning models, we tested several online machine-learning models using the TON-IoT dataset which was designed specifically for evaluating Artificial Intelligence (AI)-based security applications in IoT. The experimental results showed that the online machine-learning models exhibit performance on par with batch machine-learning models while saving significant computational resources. This notable benefit highlights the potential of online machine-learning models as promising candidates for developing machine learning-based IDSs for IoT infrastructure.

References

[1]
Christos Constantinides, Stavros Shiaeles, Bogdan Ghita, and Nicholas Kolokotronis. 2019. A Novel Online Incremental Learning Intrusion Prevention System. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, Spain, 1–6. https://doi.org/10.1109/NTMS.2019.8763842
[2]
Mahendra Data and Masayoshi Aritsugi. 2021. T-DFNN: An Incremental Learning Algorithm for Intrusion Detection Systems. IEEE Access 9 (November 2021), 154156–154171. https://doi.org/10.1109/ACCESS.2021.3127985
[3]
Mahendra Data and Masayoshi Aritsugi. 2022. An Incremental Learning Algorithm on Imbalanced Data for Network Intrusion Detection Systems. In The 10th International Conference on Computer and Communications Management. ACM, Japan, 191–199. https://doi.org/10.1145/3556223.3556252
[4]
Statista Research Department. 2016. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
[5]
Mahmudul Hasan, Md. Milon Islam, Md Ishrak Islam Zarif, and M.M.A. Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7 (2019), 100059. https://doi.org/10.1016/j.iot.2019.100059
[6]
Ansam Khraisat, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. 2019. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 20 (2019), 1–22. https://doi.org/10.1186/s42400-019-0038-7
[7]
James Manyika, Michael Chui, Peter Bisson, Jonathan Woetzel, Richard Dobbs, Jacques Bughin, and Dan Aharon. 2015. The Internet of Things: Mapping the value beyond the hype. McKinsey&Company, USA. https://mck.co/3KMAWd1
[8]
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. 2013. A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications 36, 1 (jan 2013), 42–57. https://doi.org/10.1016/j.jnca.2012.05.003
[9]
Jacob Montiel, Max Halford, Saulo Martiello Mastelini, Geoffrey Bolmier, Raphael Sourty, Robin Vaysse, Adil Zouitine, Heitor Murilo Gomes, Jesse Read, Talel Abdessalem, and Albert Bifet. 2021. River: machine learning for streaming data in Python., 4945–4952 pages. https://dl.acm.org/doi/abs/10.5555/3546258.3546368
[10]
Jacob Montiel, Max Halford, Saulo Martiello Mastelini, Geoffrey Bolmier, Raphael Sourty, Robin Vaysse, Adil Zouitine, Heitor Murilo Gomes, Jesse Read, Talel Abdessalem, and Albert Bifet. 2023. River’s API Reference. https://riverml.xyz/0.18.0/api/overview/
[11]
Nour Moustafa. 2021. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society 72 (May 2021), 102994. https://doi.org/10.1016/j.scs.2021.102994
[12]
Fabian Pedregosa, Gael Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12, 85 (2011), 2825–2830. http://jmlr.org/papers/v12/pedregosa11a.html
[13]
Fabian Pedregosa, Gael Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Edouard Duchesnay. 2023. Scikit-learn’s API Reference. https://scikit-learn.org/stable/modules/classes.html
[14]
Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, and Anca Delia Jurcut. 2022. A comparative study on online machine learning techniques for network traffic streams analysis. Computer Networks 207 (April 2022), 108836. https://doi.org/10.1016/j.comnet.2022.108836
[15]
Aashish Sharma, Christian Kreibich, Fatema Bannat Wala, Johanna Amann, Keith Lehigh, Kelley Misata, Robin Sommer, and Vern Paxson. 2023. Zeek: An Open Source Network Security Monitoring Tool. https://zeek.org/
[16]
Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto De Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84 (2017), 25–37. https://doi.org/10.1016/j.jnca.2017.02.009

Index Terms

  1. Resource Efficient Intrusion Detection Systems for Internet of Things Using Online Machine-Learning Models

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIET '23: Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology
    October 2023
    722 pages
    ISBN:9798400708503
    DOI:10.1145/3626641
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. internet of things
    2. intrusion detection systems
    3. online-machine learning

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SIET 2023

    Acceptance Rates

    Overall Acceptance Rate 45 of 57 submissions, 79%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 41
      Total Downloads
    • Downloads (Last 12 months)41
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 14 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media