Distributed attack detection scheme using deep learning approach for Internet of Things

被引:539
作者
Diro, Abebe Abeshu [1 ]
Chilamkurti, Naveen [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & IT, Melbourne, Vic, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 82卷
关键词
Cybersecurity; Deep learning; Internet of Things; Fog networks; Smart cities; CODE;
D O I
10.1016/j.future.2017.08.043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybersecurity continues to be a serious issue for any sector in the cyberspace as the number of security breaches is increasing from time to time. It is known that thousands of zero-day attacks are continuously emerging because of the addition of various protocols mainly from Internet of Things (IoT). Most of these attacks are small variants of previously known cyber-attacks. This indicates that even advanced mechanisms such as traditional machine learning systems face difficulty of detecting these small mutants of attacks over time. On the other hand, the success of deep learning (DL) in various big data fields has drawn several interests in cybersecurity fields. The application of DL has been practical because of the improvement in CPU and neural network algorithms aspects. The use of DL for attack detection in the cyberspace could be a resilient mechanism to small mutations or novel attacks because of its high-level feature extraction capability. The self-taught and compression capabilities of deep learning architectures are key mechanisms for hidden pattern discovery from the training data so that attacks are discriminated from benign traffic. This research is aimed at adopting a new approach, deep learning, to cybersecurity to enable the detection of attacks in social internet of things. The performance of the deep model is compared against traditional machine learning approach, and distributed attack detection is evaluated against the centralized detection system. The experiments have shown that our distributed attack detection system is superior to centralized detection systems using deep learning model. It has also been demonstrated that the deep model is more effective in attack detection than its shallow counter parts. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:761 / 768
页数:8
相关论文
共 27 条
[11]  
Caspi Guy, INTRO DEEP LEARNING
[12]   A tutorial survey of architectures, algorithms, and applications for deep learning [J].
Deng, Li .
APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
[13]  
Diro A. A., 2017, MOBILE NETW APPL, P1
[14]  
Gondim Costa, 2016, SENSORS, V16, P1855
[15]  
Ibrahim M., 2016, J NETW SECUR, V18
[16]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[17]   Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Gritzalis, Stefanos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :184-208
[18]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[19]   A Hybrid Malicious Code Detection Method based on Deep Learning [J].
Li, Yuancheng ;
Ma, Rong ;
Jiao, Runhai .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05) :205-215
[20]  
Niyaz Q., 2016, ACM 9 EAI INT C BIOI