Network Data Security For The Detection System in The Internet of Things With Deep Learning Approach
Network Data Security For The Detection System in The Internet of Things With Deep Learning Approach
Network Data Security For The Detection System in The Internet of Things With Deep Learning Approach
V. CONCLUSIONS
Comparing the results of all classifiers and their layers
Our studies are very much about the analysis of a new
The optimized results of all the IDS classifiers are
domain that is the Internet of Things with the presentation
compared and it was found that the performance of the
of architecture and neural networks. This research focused
All-Layers IDS classifiers is inferior to the Individual layer
on the processing of IoT elements where processing power
IDS classifiers in terms of training accuracy and training
is low with data size that is not as huge. This inter-
time. The light-weight algorithms, when used in a
disciplinary research is novel in a way that, it has applied
multilayer architecture, perform better which is suitable for
deep learning methods for IoT security. We have proposed
an IoT system. The comparison of the results can be found
light-weight architecture for an Intrusion Detection System
in Table.
(IDS) in an IoT network. Based on TCP/IP layer
architecture and the attack types at each layer, we have
Feature IDS Type Number Training Training
suggested placing IDS classifiers at each layer. This has
Selection of Accuracy Time
reduced the data set size at each classifier and improved
Method features
the performance in terms of accuracy, recall, training time
Random All Layer 12 98.9 50.04
and false alarm rate. We have applied deep learning
Forest IDS secnds
algorithms to classify the data at each IDS classifier. This
Classifier Application 6 98.7 20.54 approach has achieved outstanding results with better
layer IDS secnds results than existing work in the literature. Moreover, we
Transport 6 99.469 18,85 have used the full KDD 99’cup 22% data set for the
www.ijaers.com Page | 211
International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-5, Issue-6, Jun- 2018]
https://dx.doi.org/10.22161/ijaers.5.6.30 ISSN: 2349-6495(P) | 2456-1908(O)
experiments, unlike previous research work.The training large-scale web QoS prediction scheme for the
time of Transport Layer IDS, Application Layer IDS and Industrial Internet of Things based on a kernel machine
Network Layer IDS is almost half of the All Layer IDS learning algorithm. Computer Networks. Vol. 101. Pp.
which is important for dynamic IoT networks. The 81-89.
accuracy and false alarm rate of All-Layer IDS is 98.91% [4] Hasan, M. A. M., Nasser, M., Ahmad, S., & Molla, K. I.
and 0.76% respectively which outperformed all other (2016). Feature Selection for Intrusion Detection Using
existing IDS classifiers in literature. As the IoT deals with Random Forest. Journal of Information Security. Vol.
user's personal data and industry's information, it is crucial 7(03). Pp. 129.
to implement robust solutions to protect from security [5] Li, Y., & Guo, L. (2007). An active learning based
threats. This can be possible with the concepts of machine TCM-KNN algorithm for supervised network intrusion
learning and deep learning as IoT generate a humongous detection. Computers & security. Vol. 26(7). Pp. 459-
amount of heterogeneous data. We have applied Gated- 467.
Recurrent-Unit neural networks to the dataset. However, [6] Breiman, L., 2001. Random forests. Machine Learning.
there are many improvised versions of recurrent neural Vol. 45 (1). Pp. 5–32.
networks such as Dynamic RNN, Bi-Directional RNN [7] Dua, S., & Du, X. (2016). Data mining and machine
which can achieve better performances than basic GRU learning in cybersecurity. CRC press.
cells. One can also build a hybrid network using [8] Alpaydin, E. (2014). Introduction to machine learning.
convolutional neural networks and recurrent neural MIT press
networks to deal with multi-modal data. And here we are [9] Lichodzijewski, P., Zincir-Heywood, A., & Heywood,
at the end and this research that was focused on data M. (2002). Host-based intrusion detection using self-
security; we say here that our goal was achieved given the organizing maps. Hawaii, USA. Vol. 2. Pp. 1-29
end result which was satisfactory. We say that our research [10] S. Harris. (2015). “All in one CISSP Exam Guide,”
has positive results and exceeded the capacity levels of all McGraw-Hill. Vol. 7. Pp. 145-467
existing work. We will continue to deepen our knowledge [11] A. A. Shah, M. S. H. Kiyhal, M.D. Awan. 2015.
and the suggestions of everyone are welcome. “Analysis of Machine Learning Techniques for
Intrusion Detection System: A Review,” International
ACKNOWLEDGEMENT Journal of Computer Applications, Vol. 119. Pp. 19-23.
In terms of gratitude, I first thank my God and my family Article (CrossRef Link)
(my father and mother) for this life that gave me. This [12] S. Juma, Z. Muda, M. A. Mohamed, W. Yassin. (2015).
research is the result of enormous support from my dear “Machine learning techniques for intrusion detection
teacher MAYAO. I am thankful for his humble and simple system: a review,” Journal of Theoretical and Applied
personality, I would like to thank him with all my heart for Information Technology. Vol. 72. Pp. 422-429
all the sacrifices, directions, understanding and advice [13] Hanahan D, Weinberg RA. (2011). Hallmarks of cancer:
despite the language that does not allow us to the next generation. Vol. 144. Pp. 646–74.
communicate well but my teacher was always present for [14] Polley M-YC, Freidlin B, Korn EL, Conley BA,
me. I thank all the teachers of my department and those Abrams JS, McShane LM. (2013). Statistical and
who taught me the Chinese language for their support and practical considerations for clinical evaluation of
encouragement. I am also grateful to all the friends who predictive biomarkers. J Natl Cancer Inst. Vol. 105. Pp.
helped me a lot and motivated me to reach my goal, 1677–83.
especially I would like to thank Jean Marie Cimula and [15] Kim, J., & Kim, H. (2015, August). Applying Recurrent
Miguel Kakanakou for their love, motivation and Neural Network to Intrusion Detection with Hessian
encouragement. I think that the man must have the hard Free Optimization. In International Workshop on
spirit to support the realities of life and the determination Information Security Applications. Vol. 3. Pp. 357-369.
to accomplish his goals. Springer, Cham.
[16] L. You, Y. Li, Y. Wang, J. Zhang, and Y. Yang. (2016).
REFERENCES “A deep learningbased RNNs model for automatic
[1] Xu, K., Wang, X., Wei, W., Song, H., & Mao, B. (2016). security audit of short messages,”International
Toward software defined smart home. IEEE Symposium on Communications and Information
Communications Magazine. Vol. 54(5), pp. 116-122 Technologies (ISCIT). Qingdao, China: IEEE. Vol.
[2] Pan, G., Qi, G., Zhang, W., Li, S., Wu, Z., & Yang, L. T. 16488389. Pp. 225–229.
(2013).Trace analysis and mining for smart cities: issues, [17] Tesauro, G., Touretzky, D., & Leen, T. (1993)
methods, and applications. IEEE Communications Comparing the Prediction Accuracy of Artificial Neural
Magazine. Vol. 51(6). Pp.120- 126. Networks and Other Statistical Models for Breast
[3] Luo, X., Liu, J., Zhang, D., & Chang, X. (2016). A
www.ijaers.com Page | 212
International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-5, Issue-6, Jun- 2018]
https://dx.doi.org/10.22161/ijaers.5.6.30 ISSN: 2349-6495(P) | 2456-1908(O)
Cancer Survival. Advances in Neural Information
Processing Systems, Vol. 7. Pp. 1063--1067. The MIT
Press.
[18] K. Alrawashdeh and C. Purdy. (2016). “Toward an
Online Anomaly Intrusion Detection System Based on
Deep Learning,”IEEE International Conference on
Machine Learning and Applications (ICMLA).
Anaheim, California, USA: IEEE. Pp. 195–200.
[19] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi,
and M. Ghogho. (2016). “Deep learning approach for
network intrusion detection in software defined
networking,”International Conference on Wireless
Networks and Mobile Communications (WINCOM). Pp.
258–263.
[20] M.-J. Kang and J.-w. Kang. (2016). “Intrusion
Detection System Using Deep Neural Network for In-
Vehicle Network Security”. Vol. 11. Pp. e0155781.
[21] Q. Niyaz, W. Sun, and A. Y. Javaid. 2016. “A deep
learning based ddos detection system in software-
defined networking (SDN)”. Vol. abs/1611.07400.
[Online]. Available: http://arxiv.org/abs/1611.0740