An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data

Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s net...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2023-05, Vol.2023, p.1-10
Hauptverfasser: Li, Chao, Fu, Yuhan, Zhang, Rui, Liang, Hai, Wang, Chonghua, Li, Junjian
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2023
creator Li, Chao
Fu, Yuhan
Zhang, Rui
Liang, Hai
Wang, Chonghua
Li, Junjian
description Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.
doi_str_mv 10.1155/2023/8903980
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2824557445</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2824557445</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</originalsourceid><addsrcrecordid>eNp9kE1PAjEQhhujiYje_AFNPOrqtNvutkc-FEkwHsRzU_sBS2CL7RLDv7cE4tHTzLx5Zt7Ji9AtgUdCOH-iQMsnIaGUAs5Qj8hSFkAoPf_rCbtEVymtACrCatZDk0GLB23Y6PUej13nTNeErGy3MWizxEOdnMVZmbadW0Td5Wn2MX_DPkQ8DXM8bBZ4rDt9jS68Xid3c6p99PnyPB-9FrP3yXQ0mBWGCAqFqTx4rqWsZKWZd6yqtTQgKgdOy5IKXgpL4cuBcNbX0jHGuDVGCAve0rrso7vj3fzg986lTq3CLrbZUlFBGed1XsjUw5EyMaQUnVfb2Gx03CsC6hCVOkSlTlFl_P6IL5vW6p_mf_oXO_Vlqw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2824557445</pqid></control><display><type>article</type><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian</creator><contributor>Wu, Yulei ; Yulei Wu</contributor><creatorcontrib>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian ; Wu, Yulei ; Yulei Wu</creatorcontrib><description>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8903980</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Algorithms ; Anomalies ; Artificial intelligence ; Big Data ; Classification ; Cybercrime ; Cybersecurity ; Datasets ; Deep learning ; Industrial applications ; Industry 4.0 ; Internet of Things ; Intrusion detection systems ; Machine learning ; Model accuracy ; Neural networks ; Signal processing ; Training</subject><ispartof>Security and communication networks, 2023-05, Vol.2023, p.1-10</ispartof><rights>Copyright © 2023 Chao Li et al.</rights><rights>Copyright © 2023 Chao Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</citedby><cites>FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</cites><orcidid>0000-0002-7369-5398 ; 0000-0003-3114-2776 ; 0000-0001-9797-6736</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Wu, Yulei</contributor><contributor>Yulei Wu</contributor><creatorcontrib>Li, Chao</creatorcontrib><creatorcontrib>Fu, Yuhan</creatorcontrib><creatorcontrib>Zhang, Rui</creatorcontrib><creatorcontrib>Liang, Hai</creatorcontrib><creatorcontrib>Wang, Chonghua</creatorcontrib><creatorcontrib>Li, Junjian</creatorcontrib><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><title>Security and communication networks</title><description>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial intelligence</subject><subject>Big Data</subject><subject>Classification</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Industrial applications</subject><subject>Industry 4.0</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Model accuracy</subject><subject>Neural networks</subject><subject>Signal processing</subject><subject>Training</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kE1PAjEQhhujiYje_AFNPOrqtNvutkc-FEkwHsRzU_sBS2CL7RLDv7cE4tHTzLx5Zt7Ji9AtgUdCOH-iQMsnIaGUAs5Qj8hSFkAoPf_rCbtEVymtACrCatZDk0GLB23Y6PUej13nTNeErGy3MWizxEOdnMVZmbadW0Td5Wn2MX_DPkQ8DXM8bBZ4rDt9jS68Xid3c6p99PnyPB-9FrP3yXQ0mBWGCAqFqTx4rqWsZKWZd6yqtTQgKgdOy5IKXgpL4cuBcNbX0jHGuDVGCAve0rrso7vj3fzg986lTq3CLrbZUlFBGed1XsjUw5EyMaQUnVfb2Gx03CsC6hCVOkSlTlFl_P6IL5vW6p_mf_oXO_Vlqw</recordid><startdate>20230530</startdate><enddate>20230530</enddate><creator>Li, Chao</creator><creator>Fu, Yuhan</creator><creator>Zhang, Rui</creator><creator>Liang, Hai</creator><creator>Wang, Chonghua</creator><creator>Li, Junjian</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-7369-5398</orcidid><orcidid>https://orcid.org/0000-0003-3114-2776</orcidid><orcidid>https://orcid.org/0000-0001-9797-6736</orcidid></search><sort><creationdate>20230530</creationdate><title>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</title><author>Li, Chao ; Fu, Yuhan ; Zhang, Rui ; Liang, Hai ; Wang, Chonghua ; Li, Junjian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1820-c6f0f5a99696a4fe467a9c086e0ea9328538d20be08edf79e4445dcc88d0fd273</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial intelligence</topic><topic>Big Data</topic><topic>Classification</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Industrial applications</topic><topic>Industry 4.0</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Model accuracy</topic><topic>Neural networks</topic><topic>Signal processing</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Chao</creatorcontrib><creatorcontrib>Fu, Yuhan</creatorcontrib><creatorcontrib>Zhang, Rui</creatorcontrib><creatorcontrib>Liang, Hai</creatorcontrib><creatorcontrib>Wang, Chonghua</creatorcontrib><creatorcontrib>Li, Junjian</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Chao</au><au>Fu, Yuhan</au><au>Zhang, Rui</au><au>Liang, Hai</au><au>Wang, Chonghua</au><au>Li, Junjian</au><au>Wu, Yulei</au><au>Yulei Wu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data</atitle><jtitle>Security and communication networks</jtitle><date>2023-05-30</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs, and the current machine learning methods are hardly competent. In part because of network attacks by intruders using cutting-edge techniques and the constrained environment of IoT devices themselves, the most widely used algorithms in recent years include CNN and LSTM, with the former being particularly good at extracting features from the original data space and the latter concentrating more on temporal features of the data. We aim to address the issue of merging spatial and temporal variables in intrusion detection models by introducing a fusion model CNN and C-LSTM in this paper. Fusion features enhanced parallelism in the training process and better results without a very deep network, giving the model a shorter training time, fast convergence, and computational speed for emerging resource-limited network entities. This model is more suitable for anomaly detection tasks in the resource-constrained and time-sensitive big data environment of the Internet of Things. KDDCup-99, a publicly available IBD dataset, was applied in our experiments to demonstrate the model’s validity. In comparison to existing deep learning implementations, our proposed multiclass classification model delivers higher accuracy, precision, and recall.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8903980</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-7369-5398</orcidid><orcidid>https://orcid.org/0000-0003-3114-2776</orcidid><orcidid>https://orcid.org/0000-0001-9797-6736</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2023-05, Vol.2023, p.1-10
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2824557445
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Anomalies
Artificial intelligence
Big Data
Classification
Cybercrime
Cybersecurity
Datasets
Deep learning
Industrial applications
Industry 4.0
Internet of Things
Intrusion detection systems
Machine learning
Model accuracy
Neural networks
Signal processing
Training
title An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T16%3A00%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Anomaly%20Detection%20Approach%20Based%20on%20Integrated%20LSTM%20for%20IoT%20Big%20Data&rft.jtitle=Security%20and%20communication%20networks&rft.au=Li,%20Chao&rft.date=2023-05-30&rft.volume=2023&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8903980&rft_dat=%3Cproquest_cross%3E2824557445%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2824557445&rft_id=info:pmid/&rfr_iscdi=true