Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit
As the use of Internet of Things (IoT) devices has increased rapidly in the last few years, a major challenge is the security of these devices. Machine learning models can adapt to complex malware tactics and identify new forms of malware that may not be detected by traditional methods but the big i...
Gespeichert in:
Veröffentlicht in: | Journal of network and systems management 2024-10, Vol.32 (4), p.96, Article 96 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 4 |
container_start_page | 96 |
container_title | Journal of network and systems management |
container_volume | 32 |
creator | Chemmakha, Mohammed Habibi, Omar Lazaar, Mohamed |
description | As the use of Internet of Things (IoT) devices has increased rapidly in the last few years, a major challenge is the security of these devices. Machine learning models can adapt to complex malware tactics and identify new forms of malware that may not be detected by traditional methods but the big issue most of cybersecurity solutions face in IoT security is that data is private and contains sensitive information so it can not be available online for cybersecurity specialist in order to use it for training Machine Learning (ML) and Deep Learning (DL) models. There is a problem with the lack of available data for use in ML models. Using Generative Adversarial Network (GAN) can be used to produce simulated data that looks like real one, which can be used to protect the privacy of real-world data. This can be particularly useful in situations where the data contains sensitive information, furthermore IoT devices run using less consumption of computational resources of CPU and memory, so training complex models is a big challenge. To this end, we implemented Gated Recurrent Unit (GRU) instead of the Long Short-Term Memory (LSTM) model because GRU architecture has fewer parameters compared to LSTM and requires less consumption of CPU and memory. We used the UNSW-NB15 dataset in our work. Our results show that this architecture requires less time for training the ML models than LSTM-based models, and in terms of static similarity, majority of columns give a high similarity score. We implemented Random Forest (RF) to classify the dataset. Before generating data, we achieved an accuracy, f1-score, and geometric mean of 97.68%, 97.65%, and 97.7%, respectively. After generating samples using our proposed architecture, we merged these synthetic samples with real ones and classify them using RF. The results improved significantly; we achieved an accuracy, f1-score, and geometric mean of 99.36%, 99.35%, and 99.36%, respectively. |
doi_str_mv | 10.1007/s10922-024-09873-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3108456150</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3108456150</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-4f1405f8a761ff822dcacacff021495e86e6eda47cbca201942f382ef7d441023</originalsourceid><addsrcrecordid>eNp9kM9u2zAMxo2hA5Z2e4GeBOzsjpJlyz56_ZMVCFZgSM8CK1OJ20zOKCVBH2LvPLUp0NvAAz-A348Ev6I4l3AhAcy3KKFTqgSlS-haU5XyQzGTdRbGQH2SNTS6NLWBT8VpjI8A0FZdPSv-LqcD8hAFiiuirVgQchjDSvTbLU_o1sJPLG6npehTQveUXYlcGqcgvmOkQWSB4icdxJwCMaZxT6If9sQRecRNHqXDxE-iZ7ceX9Adk8AwiDmmjP8it2OmkMR9GNPn4qPHTaQvb_2suL-5Xl7-KBd389vLflE6BZBK7aWG2rdoGul9q9TgMJf3oKTuamobamhAbdyDQwWy08pXrSJvBq0lqOqs-Hrcm3_8s6OY7OO045BP2kpCq-tG1pBd6uhyPMXI5O2Wx9_Iz1aCfYndHmO3OXb7GruVGaqOUMzmsCJ-X_0f6h8tioZo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3108456150</pqid></control><display><type>article</type><title>Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit</title><source>SpringerLink Journals</source><creator>Chemmakha, Mohammed ; Habibi, Omar ; Lazaar, Mohamed</creator><creatorcontrib>Chemmakha, Mohammed ; Habibi, Omar ; Lazaar, Mohamed</creatorcontrib><description>As the use of Internet of Things (IoT) devices has increased rapidly in the last few years, a major challenge is the security of these devices. Machine learning models can adapt to complex malware tactics and identify new forms of malware that may not be detected by traditional methods but the big issue most of cybersecurity solutions face in IoT security is that data is private and contains sensitive information so it can not be available online for cybersecurity specialist in order to use it for training Machine Learning (ML) and Deep Learning (DL) models. There is a problem with the lack of available data for use in ML models. Using Generative Adversarial Network (GAN) can be used to produce simulated data that looks like real one, which can be used to protect the privacy of real-world data. This can be particularly useful in situations where the data contains sensitive information, furthermore IoT devices run using less consumption of computational resources of CPU and memory, so training complex models is a big challenge. To this end, we implemented Gated Recurrent Unit (GRU) instead of the Long Short-Term Memory (LSTM) model because GRU architecture has fewer parameters compared to LSTM and requires less consumption of CPU and memory. We used the UNSW-NB15 dataset in our work. Our results show that this architecture requires less time for training the ML models than LSTM-based models, and in terms of static similarity, majority of columns give a high similarity score. We implemented Random Forest (RF) to classify the dataset. Before generating data, we achieved an accuracy, f1-score, and geometric mean of 97.68%, 97.65%, and 97.7%, respectively. After generating samples using our proposed architecture, we merged these synthetic samples with real ones and classify them using RF. The results improved significantly; we achieved an accuracy, f1-score, and geometric mean of 99.36%, 99.35%, and 99.36%, respectively.</description><identifier>ISSN: 1064-7570</identifier><identifier>EISSN: 1573-7705</identifier><identifier>DOI: 10.1007/s10922-024-09873-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Accuracy ; Classification ; Communications Engineering ; Computer architecture ; Computer Communication Networks ; Computer Science ; Computer Systems Organization and Communication Networks ; Consumption ; Cybersecurity ; Datasets ; Deep learning ; Generative adversarial networks ; Information Systems and Communication Service ; Internet of Things ; Machine learning ; Malware ; Memory devices ; Networks ; Operations Research/Decision Theory ; Parameter sensitivity ; Privacy ; Similarity</subject><ispartof>Journal of network and systems management, 2024-10, Vol.32 (4), p.96, Article 96</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-4f1405f8a761ff822dcacacff021495e86e6eda47cbca201942f382ef7d441023</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10922-024-09873-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10922-024-09873-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Chemmakha, Mohammed</creatorcontrib><creatorcontrib>Habibi, Omar</creatorcontrib><creatorcontrib>Lazaar, Mohamed</creatorcontrib><title>Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit</title><title>Journal of network and systems management</title><addtitle>J Netw Syst Manage</addtitle><description>As the use of Internet of Things (IoT) devices has increased rapidly in the last few years, a major challenge is the security of these devices. Machine learning models can adapt to complex malware tactics and identify new forms of malware that may not be detected by traditional methods but the big issue most of cybersecurity solutions face in IoT security is that data is private and contains sensitive information so it can not be available online for cybersecurity specialist in order to use it for training Machine Learning (ML) and Deep Learning (DL) models. There is a problem with the lack of available data for use in ML models. Using Generative Adversarial Network (GAN) can be used to produce simulated data that looks like real one, which can be used to protect the privacy of real-world data. This can be particularly useful in situations where the data contains sensitive information, furthermore IoT devices run using less consumption of computational resources of CPU and memory, so training complex models is a big challenge. To this end, we implemented Gated Recurrent Unit (GRU) instead of the Long Short-Term Memory (LSTM) model because GRU architecture has fewer parameters compared to LSTM and requires less consumption of CPU and memory. We used the UNSW-NB15 dataset in our work. Our results show that this architecture requires less time for training the ML models than LSTM-based models, and in terms of static similarity, majority of columns give a high similarity score. We implemented Random Forest (RF) to classify the dataset. Before generating data, we achieved an accuracy, f1-score, and geometric mean of 97.68%, 97.65%, and 97.7%, respectively. After generating samples using our proposed architecture, we merged these synthetic samples with real ones and classify them using RF. The results improved significantly; we achieved an accuracy, f1-score, and geometric mean of 99.36%, 99.35%, and 99.36%, respectively.</description><subject>Accuracy</subject><subject>Classification</subject><subject>Communications Engineering</subject><subject>Computer architecture</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Consumption</subject><subject>Cybersecurity</subject><subject>Datasets</subject><subject>Deep learning</subject><subject>Generative adversarial networks</subject><subject>Information Systems and Communication Service</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Memory devices</subject><subject>Networks</subject><subject>Operations Research/Decision Theory</subject><subject>Parameter sensitivity</subject><subject>Privacy</subject><subject>Similarity</subject><issn>1064-7570</issn><issn>1573-7705</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kM9u2zAMxo2hA5Z2e4GeBOzsjpJlyz56_ZMVCFZgSM8CK1OJ20zOKCVBH2LvPLUp0NvAAz-A348Ev6I4l3AhAcy3KKFTqgSlS-haU5XyQzGTdRbGQH2SNTS6NLWBT8VpjI8A0FZdPSv-LqcD8hAFiiuirVgQchjDSvTbLU_o1sJPLG6npehTQveUXYlcGqcgvmOkQWSB4icdxJwCMaZxT6If9sQRecRNHqXDxE-iZ7ceX9Adk8AwiDmmjP8it2OmkMR9GNPn4qPHTaQvb_2suL-5Xl7-KBd389vLflE6BZBK7aWG2rdoGul9q9TgMJf3oKTuamobamhAbdyDQwWy08pXrSJvBq0lqOqs-Hrcm3_8s6OY7OO045BP2kpCq-tG1pBd6uhyPMXI5O2Wx9_Iz1aCfYndHmO3OXb7GruVGaqOUMzmsCJ-X_0f6h8tioZo</recordid><startdate>20241001</startdate><enddate>20241001</enddate><creator>Chemmakha, Mohammed</creator><creator>Habibi, Omar</creator><creator>Lazaar, Mohamed</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20241001</creationdate><title>Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit</title><author>Chemmakha, Mohammed ; Habibi, Omar ; Lazaar, Mohamed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-4f1405f8a761ff822dcacacff021495e86e6eda47cbca201942f382ef7d441023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Classification</topic><topic>Communications Engineering</topic><topic>Computer architecture</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Consumption</topic><topic>Cybersecurity</topic><topic>Datasets</topic><topic>Deep learning</topic><topic>Generative adversarial networks</topic><topic>Information Systems and Communication Service</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Memory devices</topic><topic>Networks</topic><topic>Operations Research/Decision Theory</topic><topic>Parameter sensitivity</topic><topic>Privacy</topic><topic>Similarity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chemmakha, Mohammed</creatorcontrib><creatorcontrib>Habibi, Omar</creatorcontrib><creatorcontrib>Lazaar, Mohamed</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of network and systems management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chemmakha, Mohammed</au><au>Habibi, Omar</au><au>Lazaar, Mohamed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit</atitle><jtitle>Journal of network and systems management</jtitle><stitle>J Netw Syst Manage</stitle><date>2024-10-01</date><risdate>2024</risdate><volume>32</volume><issue>4</issue><spage>96</spage><pages>96-</pages><artnum>96</artnum><issn>1064-7570</issn><eissn>1573-7705</eissn><abstract>As the use of Internet of Things (IoT) devices has increased rapidly in the last few years, a major challenge is the security of these devices. Machine learning models can adapt to complex malware tactics and identify new forms of malware that may not be detected by traditional methods but the big issue most of cybersecurity solutions face in IoT security is that data is private and contains sensitive information so it can not be available online for cybersecurity specialist in order to use it for training Machine Learning (ML) and Deep Learning (DL) models. There is a problem with the lack of available data for use in ML models. Using Generative Adversarial Network (GAN) can be used to produce simulated data that looks like real one, which can be used to protect the privacy of real-world data. This can be particularly useful in situations where the data contains sensitive information, furthermore IoT devices run using less consumption of computational resources of CPU and memory, so training complex models is a big challenge. To this end, we implemented Gated Recurrent Unit (GRU) instead of the Long Short-Term Memory (LSTM) model because GRU architecture has fewer parameters compared to LSTM and requires less consumption of CPU and memory. We used the UNSW-NB15 dataset in our work. Our results show that this architecture requires less time for training the ML models than LSTM-based models, and in terms of static similarity, majority of columns give a high similarity score. We implemented Random Forest (RF) to classify the dataset. Before generating data, we achieved an accuracy, f1-score, and geometric mean of 97.68%, 97.65%, and 97.7%, respectively. After generating samples using our proposed architecture, we merged these synthetic samples with real ones and classify them using RF. The results improved significantly; we achieved an accuracy, f1-score, and geometric mean of 99.36%, 99.35%, and 99.36%, respectively.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10922-024-09873-1</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1064-7570 |
ispartof | Journal of network and systems management, 2024-10, Vol.32 (4), p.96, Article 96 |
issn | 1064-7570 1573-7705 |
language | eng |
recordid | cdi_proquest_journals_3108456150 |
source | SpringerLink Journals |
subjects | Accuracy Classification Communications Engineering Computer architecture Computer Communication Networks Computer Science Computer Systems Organization and Communication Networks Consumption Cybersecurity Datasets Deep learning Generative adversarial networks Information Systems and Communication Service Internet of Things Machine learning Malware Memory devices Networks Operations Research/Decision Theory Parameter sensitivity Privacy Similarity |
title | Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T13%3A39%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Towards%20a%20Deep%20Learning%20Approach%20for%20IoT%20Attack%20Detection%20Based%20on%20a%20New%20Generative%20Adversarial%20Network%20Architecture%20and%20Gated%20Recurrent%20Unit&rft.jtitle=Journal%20of%20network%20and%20systems%20management&rft.au=Chemmakha,%20Mohammed&rft.date=2024-10-01&rft.volume=32&rft.issue=4&rft.spage=96&rft.pages=96-&rft.artnum=96&rft.issn=1064-7570&rft.eissn=1573-7705&rft_id=info:doi/10.1007/s10922-024-09873-1&rft_dat=%3Cproquest_cross%3E3108456150%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3108456150&rft_id=info:pmid/&rfr_iscdi=true |