Needed Paper
Needed Paper
Needed Paper
Article
Intrusion Detection in IoT Networks Using Deep
Learning Algorithm
Bambang Susilo and Riri Fitri Sari *
Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia;
[email protected]
* Correspondence: [email protected]
Received: 26 April 2020; Accepted: 14 May 2020; Published: 21 May 2020
Abstract: The internet has become an inseparable part of human life, and the number of devices
connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices have
become a part of everyday human life. However, some challenges are increasing, and their solutions
are not well defined. More and more challenges related to technology security concerning the
IoT are arising. Many methods have been developed to secure IoT networks, but many more
can still be developed. One proposed way to improve IoT security is to use machine learning.
This research discusses several machine-learning and deep-learning strategies, as well as standard
datasets for improving the security performance of the IoT. We developed an algorithm for detecting
denial-of-service (DoS) attacks using a deep-learning algorithm. This research used the Python
programming language with packages such as scikit-learn, Tensorflow, and Seaborn. We found that a
deep-learning model could increase accuracy so that the mitigation of attacks that occur on an IoT
network is as effective as possible.
Keywords: machine learning; deep learning; Internet of Things; distributed denial-of-service attack;
intrusion detection
1. Introduction
The Internet of Things (IoT) is a very recent technology that interfaces devices through the internet,
improving and supporting people’s lives, careers, and cultures [1]. In 2017, Yuan et al. [2] suggested that
17 million denial-of-service attacks would happen by 2020. The IoT is one of the quickest developing
online areas, with 50 billion connected gadgets expected before the end of 2020 [3].
Internet of Things frameworks are open around the world, essentially comprising compelled
assets and developed by lossy connections. Accordingly, critical adjustments of existing security ideas
for data and remote systems ought to be actualized to provide compelling IoT security techniques.
When utilizing current security instruments, for instance, encryption, authentication, access control,
network protection, and application control take time and are insufficient for a huge system among
many associated machines, with every piece of the system having its own vulnerability. For instance,
Mirai is an uncommon sort of botnet that triggers huge-scale distributed denial-of-service (DDoS)
strikes by abusing IoT machines [4]. The Persirai thingbot is one variant of Mirai code that continues
to grow and infect Internet Protocol (IP) cameras [5]. Current protection components ought to be
improved to fit the IoT ecosystem [6]. Nonetheless, usage protection components are immediately
defeated when facing against the predetermined protection risks with various type of attacks made
by enemies to bypass current settings. As an example, an enhanced DDoS offense masquerades as
the origin IP address in order to make the offensive area undetectable by safeguards. Subsequently,
offensives that are more unpredictable and ruinous than Mirai have been observed as a common result
of the vulnerabilities of IoT frameworks. Additionally, in this study, we sought to identify strategies in
IoT frameworks to face several vulnerabilities and scenarios of IoT applications [6]. Thus, creating
successful IoT security strategies was a research focus in this work.
Many methods and frameworks to mitigate network attacks have been developed.
Machine-learning and deep-learning methods, both supervised and unsupervised, can help to
observe logs that can reach millions in a day on a large network. Furthermore, many researchers use
network-attack datasets: the knowledge discovery and data (KDD) cup obtained from the International
Knowledge Discovery and Data Mining Tools Competition, the NSL-KDD is dataset developed by the
Canadian Institute for Cybersecurity at the University of New Brunswick, and the BoT-IoT is dataset
developed by the University of New South Wales (UNSW) Canberra Cyber center.
In this research, the authors classify attacks by using an existing dataset. The classification of the
attacks uses machine-learning (random forests: RF) and deep-learning methods (convolutional neural
network: CNN; multi-layer perceptron: MLP). The results of the study are expected to be used in a
network-based intrusion detection system (NIDS) to conduct anomaly detection on an IoT network.
This article is organized as follows. Section 2 introduces the security and deep-learning method.
A machine-learning application in IoT security is presented in Section 3. The results and analysis
appear in Section 4. Finally, in Section 5, we present the conclusion.
kinds, that is gathered with computing devices and able to be approved by clients (e.g., official goods
in warehouses and people who need information) [18].
Availability: The administration conveyed by IoT frameworks should consistently be accessible
to authorized users. Accessibility is a central element of a fruitful arrangement of IoT frameworks.
IoT frameworks and devices can now be rendered inaccessible by numerous dangers, such as DoS or
active jamming. Accordingly, guaranteeing the persistent accessibility of IoT administration to clients
is a fundamental aspect of IoT protection.
TP + TN
Accuracy = . (1)
TP + TN + FP + FN
Precision: This describes the level of accuracy between the requested data and the predicted
results provided by the model. Thus, precision is the ratio of true positive predictions compared to
overall positive predicted results. Precision values can be obtained by the Equation (2):
TP
Precision = , (2)
TP + FP
where TP is true positive, TN is true negative, FP is false positive, and FN is false negative.
Table 2 shows the parameters we used for the CNN and MLP. For the activation function, we
used rectified linear unit (ReLU) and softmax for both classifier algorithms. We also utilized the Adam
optimizer in the experiment.
Figure 1 depicts the training and testing algorithm of the process of the dataset.
Figure 2. Structure of the convolutional neural network (CNN) model used in the experiment.
This shows the layers used in the CNN algorithm and their arrangement.
The role of dropout layers is to simplify computational complexity and the convergence of the
learning process.
4. Results
The results obtained from the multiclass classification can be seen in Table 3.
Metrics
Algorithm
AUC DDOS AUC DOS AUC Reconnaissance AuC Normal AUC Theft
Random
1 1 0.98 1 0.96
Forests (RF)
CNN 0.98 0.98 0.99 0.99 1
MLP 0.56 0.51 0.97 0.99 0.99
A receiver operating characteristic (ROC) curve shows the performance measurement tool for
classification problems in determining the threshold of a model. This ROC curve had two parameters:
true positive rate and false positive rate.
An area under the curve (AUC) is used for classification analysis in terms of choosing which
model best predicts a class. One example application is the ROC curve. Here, the true positive rate is
compared to the false positive rate.
As seen in Figure 3, the RF was good for multiclass classification as a whole.
Information 2020, 11, 279 7 of 11
Figure 3. Receiver operating characteristic (ROC) curve of the random forest (RF) algorithm.
As can be seen in Figure 5, MLP was not as good as RF or the CNN at multiclass classification.
From Table 4, with batch size 32, it appears that the mean accuracy increased with increasing
number of research epochs for the MLP classifier. For the CNN, there was a slight decrease when the
number of epochs increased from 10 to 50.
Information 2020, 11, 279 8 of 11
Table 5 shows the result with batch size 64. Here, the mean accuracy decreased with the increasing
number of research epochs for the MLP classifier. For the CNN, there was a slight decrease when the
number of epochs increased from 10 to 50.
Table 6 shows the result with batch size 128. It appears that the mean accuracy increased with
the increasing number of research epochs for the MLP classifier. For the CNN, there was a slight
decrease when the number of epochs increased from 10 to 30, and then it increased at 50 epochs.
From Tables 3–5, we can see that the increase in batch size could reduce duration time.
5. Conclusions
In this study, we examined different machine-learning and deep-learning algorithms in an IoT
network. We incorporated the evaluation of RF, CNN, and MLP algorithms. Random forests and
the CNN provided the best result in terms of accuracy and the AUC for multiclass classification.
The addition of epochs in experiments with 32 and 64 batches resulted in a slight decrease in accuracy,
whereas in trials with 128 batches, there was a slight increase in accuracy.
We also found that increasing the batch size could speed up the calculation process. Doubling the
change in batch size on the MLP could make the calculation process 1.4–2.6 times faster, whereas the
CNN could make the calculation process 1.8–2.4 times faster.
In the future, we aim to develop models with different algorithms and also to combine several
algorithms for machine learning or deep learning. In addition, this algorithm is expected to be
implemented into the NIDS so that it can be used in real time to mitigate attacks.
Author Contributions: Conceptualization, B.S. and R.F.S.; methodology, B.S.; software, B.S.; validation, B.S. and
R.F.S.; formal analysis, B.S.; resources, B.S. and R.F.S.; data curation, B.S.; writing—original draft preparation, B.S.;
Information 2020, 11, 279 9 of 11
writing—review and editing, R.F.S.; visualization, B.S.; supervision, R.F.S. All authors have read and agreed to the
published version of the manuscript.
Funding: This research received partial funding from University of Indonesia under PUTI Q2 Grant number
NKB-1732/UN2.RST/HKP.05.00/2020.
Acknowledgments: We thank the University of Indonesia for financial support for this research under the PUTI
Q2 Grant number NKB-1723/UN2.RST/HKP.05.00/2020. The authors would like to express their deep gratitude to
the reviewers for their valuable suggestions and important comments that have greatly helped to improve the
presentation of this manuscript.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Roopak, M.; Tian, G.Y.; Chambers, J. Deep Learning Models for Cyber Security in IoT Networks.
In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference
(CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 452–457. [CrossRef]
2. Yuan, X.; Li, C.; Li, X. DeepDefense: Identifying DDoS Attack via Deep Learning. In Proceedings of the 2017
IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China, 29–31 May 2017;
pp. 1–8. [CrossRef]
3. Evans, D. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything; Cisco Internet
Business Solutions Group (IBSG): San Jose, CA, USA, 2011.
4. Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and Other Botnets. Computer 2017,
50, 80–84. [CrossRef]
5. Radanliev, P. Future developments in cyber risk assessment for the internet of things. Comput. Ind. 2018, 102,
14–22. [CrossRef]
6. Bertino, E.; Islam, N. Botnets and Internet of Things Security. Computer 2017, 50, 76–79. [CrossRef]
7. Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.; Du, X.; Guizani, M. A Survey of Machine and Deep
Learning Methods for Internet of Things (IoT) Security. arXiv 2018, arXiv:1807.11023. Available online:
https://ui.adsabs.harvard.edu/abs/2018arXiv180711023A (accessed on 2 January 2020).
8. Okpe, O.A. Intrusion Detection in Internet of Things (Iot). Int. J. Adv. Res. Comput. Sci. 2018, 9, 504–509.
[CrossRef]
9. Meidan, Y. ProfilIoT. In Proceedings of the Symposium on Applied Computing—SAC ‘17, Marrakech,
Morocco, 4–6 April 2017.
10. Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection
System for Smart Home IoT Devices. IEEE Internet Things J. 2019, 6, 9042–9053. [CrossRef]
11. Azmoodeh, A.; Dehghantanha, A.; Choo, K.-K.R. Robust Malware Detection for Internet of (Battlefield)
Things Devices Using Deep Eigenspace Learning. IEEE Trans. Sustain. Comput. 2019, 4, 88–95. [CrossRef]
12. Hajiheidari, S.; Wakil, K.; Badri, M.; Navimipour, N.J. Intrusion detection systems in the Internet of things:
A comprehensive investigation. Comput. Netw. 2019, 160, 165–191. [CrossRef]
13. Radanliev, P. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl.
Sci. 2020, 2. [CrossRef]
14. Nicolescu, R.; Huth, M.; Radanliev, P.; de Roure, D. Mapping the Values of IoT. J. Inf. Technol. 2019, 33,
345–360. [CrossRef]
15. Elrawy, M.F.; Awad, A.I.; Hamed, H.F.A. Intrusion detection systems for IoT-based smart environments:
A survey. J. Cloud Comput. 2018, 7. [CrossRef]
16. Jan, S.U.; Ahmed, S.; Shakhov, V.; Koo, I. Toward a Lightweight Intrusion Detection System for the Internet
of Things. IEEE Access 2019, 7, 42450–42471. [CrossRef]
17. Abomhara, M.; Koien, G.M. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders
and Attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [CrossRef]
18. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw.
Comput. Appl. 2017, 88, 10–28. [CrossRef]
Information 2020, 11, 279 10 of 11
19. Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of
Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [CrossRef]
20. Ge, M.; Fu, X.; Syed, N.; Baig, Z.; Teo, G.; Robles-Kelly, A. Deep Learning-Based Intrusion Detection for
IoT Networks. In Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable
Computing (PRDC), Kyoto, Japan, 1–3 December 2019.
21. Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
Sensors 2019, 19, 1977. [CrossRef]
22. Yin, C.; Zhu, Y.; Fei, J.; He, X. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural
Networks. IEEE Access 2017, 5, 21954–21961. [CrossRef]
23. Rhode, M.; Burnap, P.; Jones, K. Early-stage malware prediction using recurrent neural networks.
Comput. Secur. 2018, 77, 578–594. [CrossRef]
24. Kaur, S.; Singh, M. Hybrid intrusion detection and signature generation using Deep Recurrent Neural
Networks. Neural Comput. Appl. 2019. [CrossRef]
25. Vishwakarma, R.; Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT
network. Telecommun. Syst. 2019, 73, 3–25. [CrossRef]
26. Xia, S.; Guo, S.; Bai, W.; Qiu, J.; Wei, H.; Pan, Z. A New Smart Router-Throttling Method to Mitigate DDoS
Attacks. IEEE Access 2019, 7, 107952–107963. [CrossRef]
27. Cvitić, I.; Peraković, D.; Periša, M.; Botica, M. Novel approach for detection of IoT generated DDoS traffic.
Wirel. Netw. 2019. [CrossRef]
28. Siboni, S. Security Testbed for Internet-of-Things Devices. IEEE Trans. Reliab. 2019, 68, 23–44. [CrossRef]
29. Restuccia, F.; D’Oro, S.; Melodia, T. Securing the Internet of Things in the Age of Machine Learning and
Software-Defined Networking. IEEE Internet Things J. 2018, 5, 4829–4842. [CrossRef]
30. Doshi, R.; Apthorpe, N.; Feamster, N. Machine Learning DDoS Detection for Consumer Internet of Things
Devices. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA,
24 May 2018.
31. Moh, M.; Raju, R. Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing
Systems. In Proceedings of the 2018 International Conference on High Performance Computing & Simulation
(HPCS), Orleans, France, 16–20 July 2018.
32. Li, C. Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J.
Commun. Syst. 2018, 31. [CrossRef]
33. Jia, B.; Huang, X.; Liu, R.; Ma, Y. A DDoS Attack Detection Method Based on Hybrid Heterogeneous
Multiclassifier Ensemble Learning. J. Electr. Comput. Eng. 2017, 2017, 1–9. [CrossRef]
34. Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of security attacks.
In Proceedings of the 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand,
11–12 August 2016; pp. 321–326. [CrossRef]
35. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset
in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019,
100, 779–796. [CrossRef]
36. Berman, D.; Buczak, A.; Chavis, J.; Corbett, C. A Survey of Deep Learning Methods for Cyber Security.
Information 2019, 10, 122. [CrossRef]
37. Baig, Z.A.; Sanguanpong, S.; Firdous, S.N.; Vo, V.N.; Nguyen, T.G.; So-In, C. Averaged dependence estimators
for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 2020, 102, 198–209. [CrossRef]
38. Hasan, M.; Islam, M.M.; Zarif, M.I.I.; Hashem, M.M.A. Attack and anomaly detection in IoT sensors in IoT
sites using machine learning approaches. Internet Things 2019, 7. [CrossRef]
39. Buczak, A.L.; Guven, E. A Survey of Data Mining and Machine Learning Methods for Cyber Security
Intrusion Detection. IEEE Commun. Surv. Tutor. 2016, 18, 1153–1176. [CrossRef]
40. Fiore, U.; Palmieri, F.; Castiglione, A.; de Santis, A. Network anomaly detection with the restricted Boltzmann
machine. Neurocomputing 2013, 122, 13–23. [CrossRef]
41. Chen, Y.; Zhang, Y.; Maharjan, S.; Alam, M.; Wu, T. Deep Learning for Secure Mobile Edge Computing in
Cyber-Physical Transportation Systems. IEEE Netw. 2019, 33, 36–41. [CrossRef]
Information 2020, 11, 279 11 of 11
42. Hiromoto, R.E.; Haney, M.; Vakanski, A. A secure architecture for IoT with supply chain risk management.
In Proceedings of the 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced
Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania, 21–23 September 2017;
Volume 1, pp. 431–435. [CrossRef]
43. Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep
Learning Approach for Intelligent Intrusion Detection System. IEEE Access 2019, 7, 41525–41550. [CrossRef]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).