An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s net...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2023-05, Vol.2023, p.1-10 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2023 |
creator | Li, Chao Fu, Yuhan Zhang, Rui Liang, Hai Wang, Chonghua Li, Junjian |
description | Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall. |
doi_str_mv | 10.1155/2023/8903980 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2824557445</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2824557445</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</originalsourceid><addsrcrecordid>eNp9kE1PAjEQhhujiYje_AFNPOrqtNvutkc-FEkwHsRzU_sBS2CL7RLDv7cE4tHTzLx5Zt7Ji9AtgUdCOH-iQMsnIaGUAs5Qj8hSFkAoPf_rCbtEVymtACrCatZDk0GLB23Y6PUej13nTNeErGy3MWizxEOdnMVZmbadW0Td5Wn2MX_DPkQ8DXM8bBZ4rDt9jS68Xid3c6p99PnyPB-9FrP3yXQ0mBWGCAqFqTx4rqWsZKWZd6yqtTQgKgdOy5IKXgpL4cuBcNbX0jHGuDVGCAve0rrso7vj3fzg986lTq3CLrbZUlFBGed1XsjUw5EyMaQUnVfb2Gx03CsC6hCVOkSlTlFl_P6IL5vW6p_mf_oXO_Vlqw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2824557445</pqid></control><display><type>article</type><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian</creator><contributor>Wu, Yulei ; Yulei Wu</contributor><creatorcontrib>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian ; Wu, Yulei ; Yulei Wu</creatorcontrib><description>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8903980</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Algorithms ; Anomalies ; Artificial intelligence ; Big Data ; Classification ; Cybercrime ; Cybersecurity ; Datasets ; Deep learning ; Industrial applications ; Industry 4.0 ; Internet of Things ; Intrusion detection systems ; Machine learning ; Model accuracy ; Neural networks ; Signal processing ; Training</subject><ispartof>Security and communication networks, 2023-05, Vol.2023, p.1-10</ispartof><rights>Copyright © 2023 Chao Li et al.</rights><rights>Copyright © 2023 Chao Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</citedby><cites>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</cites><orcidid>0000-0002-7369-5398 ; 0000-0003-3114-2776 ; 0000-0001-9797-6736</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Wu, Yulei</contributor><contributor>Yulei Wu</contributor><creatorcontrib>Li, Chao</creatorcontrib><creatorcontrib>Fu, Yuhan</creatorcontrib><creatorcontrib>Zhang, Rui</creatorcontrib><creatorcontrib>Liang, Hai</creatorcontrib><creatorcontrib>Wang, Chonghua</creatorcontrib><creatorcontrib>Li, Junjian</creatorcontrib><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><title>Security and communication networks</title><description>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Big Data</subject><subject>Classification</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Industrial applications</subject><subject>Industry 4.0</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Model accuracy</subject><subject>Neural networks</subject><subject>Signal processing</subject><subject>Training</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kE1PAjEQhhujiYje_AFNPOrqtNvutkc-FEkwHsRzU_sBS2CL7RLDv7cE4tHTzLx5Zt7Ji9AtgUdCOH-iQMsnIaGUAs5Qj8hSFkAoPf_rCbtEVymtACrCatZDk0GLB23Y6PUej13nTNeErGy3MWizxEOdnMVZmbadW0Td5Wn2MX_DPkQ8DXM8bBZ4rDt9jS68Xid3c6p99PnyPB-9FrP3yXQ0mBWGCAqFqTx4rqWsZKWZd6yqtTQgKgdOy5IKXgpL4cuBcNbX0jHGuDVGCAve0rrso7vj3fzg986lTq3CLrbZUlFBGed1XsjUw5EyMaQUnVfb2Gx03CsC6hCVOkSlTlFl_P6IL5vW6p_mf_oXO_Vlqw</recordid><startdate>20230530</startdate><enddate>20230530</enddate><creator>Li, Chao</creator><creator>Fu, Yuhan</creator><creator>Zhang, Rui</creator><creator>Liang, Hai</creator><creator>Wang, Chonghua</creator><creator>Li, Junjian</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-7369-5398</orcidid><orcidid>https://orcid.org/0000-0003-3114-2776</orcidid><orcidid>https://orcid.org/0000-0001-9797-6736</orcidid></search><sort><creationdate>20230530</creationdate><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><author>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Big Data</topic><topic>Classification</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Industrial applications</topic><topic>Industry 4.0</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Model accuracy</topic><topic>Neural networks</topic><topic>Signal processing</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Chao</creatorcontrib><creatorcontrib>Fu, Yuhan</creatorcontrib><creatorcontrib>Zhang, Rui</creatorcontrib><creatorcontrib>Liang, Hai</creatorcontrib><creatorcontrib>Wang, Chonghua</creatorcontrib><creatorcontrib>Li, Junjian</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Chao</au><au>Fu, Yuhan</au><au>Zhang, Rui</au><au>Liang, Hai</au><au>Wang, Chonghua</au><au>Li, Junjian</au><au>Wu, Yulei</au><au>Yulei Wu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</atitle><jtitle>Security and communication networks</jtitle><date>2023-05-30</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8903980</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-7369-5398</orcidid><orcidid>https://orcid.org/0000-0003-3114-2776</orcidid><orcidid>https://orcid.org/0000-0001-9797-6736</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2023-05, Vol.2023, p.1-10 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2824557445 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Anomalies Artificial intelligence Big Data Classification Cybercrime Cybersecurity Datasets Deep learning Industrial applications Industry 4.0 Internet of Things Intrusion detection systems Machine learning Model accuracy Neural networks Signal processing Training |
title | An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T16%3A00%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Anomaly%20Detection%20Approach%20Based%20on%20Integrated%20LSTM%20for%20IoT%20Big%20Data&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Chao&rft.date=2023-05-30&rft.volume=2023&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8903980&rft_dat=%3Cproquest_cross%3E2824557445%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2824557445&rft_id=info:pmid/&rfr_iscdi=true |