Loading [MathJax]/extensions/MathMenu.js
Convolutional Neural Network Based Algorithm for Intrusion Detection in Internet of Things Databases | IEEE Conference Publication | IEEE Xplore

Convolutional Neural Network Based Algorithm for Intrusion Detection in Internet of Things Databases


Abstract:

The Internet of Things (IoT) is generally isolated from external networks using firewall technology[1]. However, with the continuous development of IoT technology, the in...Show More

Abstract:

The Internet of Things (IoT) is generally isolated from external networks using firewall technology[1]. However, with the continuous development of IoT technology, the interconnection is becoming closer and the frequency of intrusions is increasing[2]. This poses greater challenges for security measures. Therefore, it is crucial to efficiently detect intrusions in the IoT. This article proposes a convolutional neural network-based algorithm for intrusion detection in IoT databases[3]. IoT data has fixed formats, real-time characteristics, and short fields. Therefore, training with a convolutional neural network improves efficiency[4]. The algorithm monitors and analyzes network traffic in the IoT system, uses a convolutional neural network to classify and determine traffic data[5], and thus achieves attack detection in the IoT system. The algorithm designed in this article achieves an accuracy rate of 99.4%, which not only improves the accuracy of intrusion detection compared to SVM and KNN algorithms but also reduces false positive rates.
Date of Conference: 03-05 November 2023
Date Added to IEEE Xplore: 31 January 2024
ISBN Information:
Conference Location: Qingdao, China

I. Introduction

With the development of information science and technology, the application of the Internet of Things is becoming more and more widespread, bringing many conveniences to people's lives. IoT technology enables devices and sensors to connect with each other to form an intelligent network, thereby achieving automation, intelligence, and data-driven decision-making. However, as the Internet of Things continues to develop and expand, security issues have also become an increasingly important focus of attention[6]. In the current security issues of the Internet of Things, identifying abnormal behavior in the network has become an urgent problem to be solved. Although common protective measures such as firewall technology and identity authentication mechanisms can meet basic security needs, their defense capabilities are relatively limited. However, once they are subjected to hacker attacks or abnormal activities, such as zero-day vulnerability attacks, these traditional methods often prove to be inadequate[7]. Therefore, we need more innovative and powerful methods to solve this problem. In recent years, scholars at home and abroad have conducted more and more research on flow anomaly detection, and have also achieved good results[8]. Intrusion detection technology is a method of using network data acquisition and analysis to determine the legitimacy or illegal intrusion of network access. Usually, intrusion detection can be divided into two main methods: feature-based intrusion detection and anomaly-based intrusion detection. Feature-based intrusion detection is a detection method based on known attack features[9]. It uses pre-defined attack feature patterns to detect known attacks. Anomaly-based intrusion detection first establishes a model through historical data, and then compares the passed data packets with the threshold set by the established model. Common methods include machine learning and deep learning. Traditional machine learning algorithms include K-nearest neighbor algorithm, Boosting algorithm, support vector machine, K-means clustering algorithm, etc. These algorithms are mainly applied to shallow learning and have limitations for complex classification problems of large-scale high-dimensional data. On the contrary[10], deep learning can meet the predictive needs of high-dimensional learning. Compared with other machine learning methods, deep learning can extract better features from complex data, improving the accuracy of classification. The advantage of deep learning is that it can automatically learn features without manual feature engineering. This means that deep learning models can extract and learn the most discriminative features from raw data[11], thus more intelligently and effectively identifying the abnormal features of intrusion behavior. Deep learning mainly includes recurrent neural networks, deep neural networks, and convolutional neural networks. Convolutional neural networks are widely used due to their significant ability to learn high-dimensional data features.

Contact IEEE to Subscribe

References

References is not available for this document.