LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Dinh, P.V. and Nguyen, Q.U. and Hoang, D.T. and Nguyen, D.N. and Bao, S.P. and Dutkiewicz, E. (2023) Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems. IEEE Internet of Things Journal. p. 1. ISSN 23274662

Full text not available from this repository. (Upload)

Abstract

Intrusion detection systems (IDSs) play a critical role in protecting billions of IoT devices from malicious attacks. However, the IDSs for IoT devices face inherent challenges of IoT systems, including the heterogeneity of IoT data/devices, the high dimensionality of training data, and the imbalanced data. Moreover, the deployment of IDSs on IoT systems is challenging, and sometimes impossible, due to the limited resources such as memory/storage and computing capability of typical IoT devices. To tackle these challenges, this article proposes a novel deep neural network/architecture called Constrained Twin Variational Auto-Encoder (CTVAE) that can feed classifiers of IDSs with more separable/distinguishable and lower-dimensional representation data. Additionally, in comparison to the state-of-the-art neural networks used in IDSs, CTVAE requires less memory/storage and computing power, hence making it more suitable for IoT IDS systems. Extensive experiments with the 11 most popular IoT botnet datasets show that CTVAE can boost around 1 in terms of accuracy and Fscore in detection attack compared to the state-of-the-art machine learning and representation learning methods, whilst the running time for attack detection is lower than 2E-6 seconds and the model size is lower than 1 MB. We also further investigate various characteristics of CTVAE in the latent space and in the reconstruction representation to demonstrate its efficacy compared with current well-known methods. IEEE

Item Type: Article
Divisions: Offices > Office of International Cooperation
Identification Number: 10.1109/JIOT.2023.3344842
Uncontrolled Keywords: Computing power; Data mining; Deep neural networks; Intrusion detection; Network security; Signal encoding, AE; Attack detection; Auto encoders; Decoding; Face; Intrusion Detection Systems; IoT attack detection; Power capacitor; Representation learning; VAE, Internet of things
Additional Information: cited By 0
URI: http://eprints.lqdtu.edu.vn/id/eprint/11068

Actions (login required)

View Item
View Item