Yıl: 2022 Cilt: 18 Sayı: 2 Sayfa Aralığı: 333 - 361 Metin Dili: İngilizce İndeks Tarihi: 08-12-2022

MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS

Öz:
In today’s technology world, intrusion detection is important topic for the Internet of Things (IoT) systems. With the growth of using tiny devices connected to wireless networks in IoT, the amount of data is growing rapidly. This data may be vulnerable to attacks so that IoT systems need to secure it for increasing the system’s confidentiality, availability, and reliability. The progress of detecting attacks using artificial intelligence (AI) autonomously has become a more convenient method in network intrusion detection systems (NIDS). In this article, we propose new detecting technique to improve performance and increase accuracy in NIDS. We present different machine learning (ML) and deep learning (DL) methods to detect the different type of attacks for IoT systems. We also provide the experiments to find out the best way to identify the anomaly in IoT system environment, take comparisons between different AI models. The experiment was evaluated with the open database UNSW-NB15.
Anahtar Kelime:

MAKİNE VE DERİN ÖĞRENME YÖNTEMLERİ İLE NESNELERİN İNTERNETİ İÇİN SALDIRI TESPİTİNİN KARŞILAŞTIRILMASI

Öz:
Günümüz teknoloji dünyasında, Nesnelerin İnterneti (IoT) sistemleri için izinsiz giriş tespiti önemli bir konudur. IoT'de kablosuz ağlara bağlı küçük cihazların kullanımının artmasıyla birlikte veri miktarı ihtiyacı da hızla artmaktadır. Bu veriler saldırılara karşı savunmasız olabilmektedir. Bu nedenle IoT sistem çözümlerinin gizliliğini, kullanılabilirliğini ve güvenilirliğini sağlamak için bu verilerin güvenceye alınması gereklidir. Yapay zekânın (AI) otonom biçimde kullanarak saldırıların tespit edilmesi, ağ saldırı tespit sistemlerinde (NIDS) daha uygun bir yöntem haline gelmiştir. Bu çalışmada, bu tespit sistemlerinin performansını iyileştirmek ve doğruluğu artırmak için yeni tespit tekniği önerilmektedir. IoT sistemleri için farklı saldırı türlerini tespit etmek için farklı makine öğrenimi (ML) ve derin öğrenme (DL) yöntemleri birlikte sunulmaktadır. Ayrıca, IoT sistem ortamındaki anomaliyi tanımlamanın en iyi yolunu bulmak için deneyler sunulmaktadır. Bununla birlikte farklı AI modelleri arasında karşılaştırmalar yapılmaktadır. Deneyler için, UNSW-NB15 veri seti kullanılmıştır.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • Abiodun, O. I., Jantan, A., Omolara, A. E., Dada, K. V., Mohamed, N. A., & Arshad, H. (2018). “State-of-the-art in artificial neural network applications: A survey”. Heliyon, 4(11), pp. 1-41.
  • Albawi, S., Mohammed, T.A., & Al-Zawi, S. (2017). “Understanding of a convolutional neural network”. In 2017 International Conference on Engineering and Technology (ICET) (pp. 1-6).
  • Alsamiri, J., & Alsubhi, K. (2019). “Internet of things cyber attacks detection using machine learning”. International Journal of Advanced Computer Science and Applications, 10(12), pp. 627-634.
  • Boateng, E. Y., & Abaye, D. A. (2019). “A review of the logistic regression model with emphasis on medical research”. Journal of Data Analysis and Information Processing, 7(4), pp. 190-207.
  • Breiman, L. (2001). “Random Forests”. Machine Learning, 45(1), pp. 5–32. Chandrashekar, G., & Sahin, F. (2014). “A survey on feature selection methods”. Computers & Electrical Engineering, 40(1), pp. 16-28. Chomboon, K., Chujai, P., Teerarassamee, P., Kerdprasop, K., &
  • Kerdprasop, N. (2015). “An empirical study of distance metrics for k- nearest neighbor algorithm”. In Proceedings of the 3rd International Conference on Industrial Application Engineering (pp. 280-285).
  • Graves, A. (2012). “Long Short-term Memory”. Supervised Sequence Labelling with Recurrent Neural Networks (pp. 37- 45). Springer, Berlin, Heidelberg.
  • Hochreiter, S., & Schmidhuber, J. (1997). “Long Short-term Memory”. Neural Computation, 9(8), pp. 1735-1780.
  • Jozefowicz, R., Zaremba, W., & Sutskever, I. (2015). “An empirical exploration of recurrent network architectures”. F. R. Bach & D. M. Blei (Eds.), International Conference on Machine Learning (pp. 2342-2350). PMLR.
  • Kasongo, S. M., & Sun, Y. (2020). “Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset”. Journal of Big Data, 7(1), pp. 1-20.
  • Kaviani, P., & Dhotre, S. (2017). “Short survey on naive bayes algorithm”. International Journal of Advance Engineering and Research Development, 4(11), pp. 607-611.
  • Khraisat, A., Gondal, I., & Vamplew, P. (2019). “Survey of intrusion detection systems: techniques, datasets and challenges”. Cybersecurity, 2, pp. 1-20.
  • Manaswi, N. K. (2018). Deep Learning with Applications Using Python: Chatbots and Face, Object, and Speech Recognition with Tensorflow and Keras. Apress, Berkeley, CA.
  • Medsker, L. R., & Jain, L. C. (1999). Recurrent Neural Networks: Design and Applications. CRC Press.
  • Moustafa, N., & Slay, J. (2015). “UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)”. In 2015 Military Communications and Information Systems Conference (MilCIS) (pp. 1-6). Australia.
  • Patel, K. K., & Patel, S. M. (2016). “Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges”. International Journal of Engineering Science and Computing, 6(5), pp. 6122-6131.
  • Safavian, S. R., & Landgrebe, D. (1991). “A survey of decision tree classifier methodology”. IEEE Transactions on Systems, Man, and Cybernetics, 21(3), pp. 660-674.
  • Sherstinsky, A. (2020). “Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network”. Physica D: Nonlinear Phenomena, 404, Article 132306. doi:10.1016/j.physd.2019.132306.
  • Sze, V., Chen, Y. H., Yang, T. J., & Emer, J. S. (2017). “Efficient processing of deep neural networks: A tutorial and survey”. Proceedings of the IEEE, 105(12), pp. 2295-2329. doi:10.1109/JPROC.2017.2761740.
  • Van Houdt, G., Mosquera, C., & Nápoles, G. (2020). “A review on the long short-term memory model”. Artificial Intelligence Review, 53(8), pp. 5929- 5955. doi:10.1007/s10462-020-09838-1.
  • Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). “Evaluation of recurrent neural network and its variants for intrusion detection system (IDS)”. International Journal of Information System Modeling and Design (IJISMD), 8(3), pp. 43-63.
APA AMAROUCHE S, KÜÇÜK K (2022). MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. , 333 - 361.
Chicago AMAROUCHE SIHAM,KÜÇÜK KEREM MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. (2022): 333 - 361.
MLA AMAROUCHE SIHAM,KÜÇÜK KEREM MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. , 2022, ss.333 - 361.
AMA AMAROUCHE S,KÜÇÜK K MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. . 2022; 333 - 361.
Vancouver AMAROUCHE S,KÜÇÜK K MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. . 2022; 333 - 361.
IEEE AMAROUCHE S,KÜÇÜK K "MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS." , ss.333 - 361, 2022.
ISNAD AMAROUCHE, SIHAM - KÜÇÜK, KEREM. "MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS". (2022), 333-361.
APA AMAROUCHE S, KÜÇÜK K (2022). MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. Journal of Naval Sciences and Engineering, 18(2), 333 - 361.
Chicago AMAROUCHE SIHAM,KÜÇÜK KEREM MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. Journal of Naval Sciences and Engineering 18, no.2 (2022): 333 - 361.
MLA AMAROUCHE SIHAM,KÜÇÜK KEREM MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. Journal of Naval Sciences and Engineering, vol.18, no.2, 2022, ss.333 - 361.
AMA AMAROUCHE S,KÜÇÜK K MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. Journal of Naval Sciences and Engineering. 2022; 18(2): 333 - 361.
Vancouver AMAROUCHE S,KÜÇÜK K MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS. Journal of Naval Sciences and Engineering. 2022; 18(2): 333 - 361.
IEEE AMAROUCHE S,KÜÇÜK K "MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS." Journal of Naval Sciences and Engineering, 18, ss.333 - 361, 2022.
ISNAD AMAROUCHE, SIHAM - KÜÇÜK, KEREM. "MACHINE AND DEEP LEARNING-BASED INTRUSION DETECTION AND COMPARISON IN INTERNET OF THINGS". Journal of Naval Sciences and Engineering 18/2 (2022), 333-361.