ISSN: A/F

Enhanced Intrusion Detection System for IoT Networks Using Hybrid Deep Learning and Feature Selection Techniques

Abstract

The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, making IoT networks prime targets for cyberattacks. Traditional security mechanisms often fall short in addressing the complexity and scale of these threats. This paper proposes an enhanced Intrusion Detection System (IDS) for IoT networks utilizing a hybrid deep learning approach combined with effective feature selection techniques. The proposed IDS integrates a Convolutional Neural Network (CNN) for feature extraction and a Recurrent Neural Network (RNN), specifically Long Short-Term Memory (LSTM), for temporal sequence analysis of network traffic. A feature selection method based on Information Gain and Variance Thresholding is employed to reduce dimensionality and improve the efficiency and accuracy of the deep learning model. The performance of the hybrid IDS is evaluated using benchmark IoT network datasets, demonstrating superior detection accuracy, lower false positive rates, and enhanced resilience against various attack vectors compared to existing state-of-the-art methods. The results highlight the potential of this approach to significantly improve the security posture of IoT environments.

References

  1. [1] Butun, I., Özer, M., & Alagoz, B. B. (2014). Security threats and vulnerabilities in internet of things: A survey. 2014 International Conference on Computer, Electrical, and Electronics Engineering, ICCEEE 2014, 274–279
  2. [2] Sedjelmaci, H., Ouaddah, A., & Taleb, A. (2017). Intrusion detection for IoT using machine learning: A survey. 2017 IEEE International Conference on Communications (ICC), 1–6
  3. [3] Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2017). Deep learning approaches for intelligent intrusion detection. IEEE Access, 5, 4153–4166
  4. [4] Hodo, E., Bellekens, X., Camilleri, G. P., Papa, M., Ferrari, F., & Hamilton, A. (2016). Threat analysis of IoT networks using machine learning. 2016 IEEE International Symposium on Technologies for Homeland Security (HST), 1–6
  5. [5] Li, Y., Zhao, S., & Zhang, W. (2018). A hybrid intrusion detection system based on SVM and KNN. 2018 10th International Conference on Modelling, Identification and Control (ICMIC), 1–6
  6. [6] Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., & Lloret, J. (2017). Network traffic classification with convolutional and recurrent neural networks for Internet of Things. IEEE Access, 5, 18023–18030
  7. [7] Inan, O. A., Mamat, R., & Zakaria, Z. (2017). Feature selection using genetic algorithm for intrusion detection system. 2017 7th International Conference on Cloud Computing and Services Science (CLOSER), 118–125
  8. [8] Mittal, S., Rawat, S., & Sharma, A. (2017). Intrusion detection in wireless sensor networks using information gain and support vector machine. 2017 International Conference on Next Generation Computing and Communication (ICNGC), 83–88
  9. [9] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 1-6
  10. [10] Moustafa, N., & Slay, J. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 4th International Conference on Cyber Security, Cybercrime and Internet of Things (CSCIOT), 1-6
  11. [11] Sharafaldin, I., Lashkari, A. H., Hakimian, P., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. 4th International Conference on Information Systems Security and Privacy (ICISSP), 108-116
  12. [12] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT press
  13. [13] Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8), 1735-1780
  14. [14] Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... & Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems, 30
  15. [15] Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., ... & Ghemawat, S. (2016). TensorFlow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467
Download PDF

How to Cite

Narendra Kumar, (2025/4/29). Enhanced Intrusion Detection System for IoT Networks Using Hybrid Deep Learning and Feature Selection Techniques. JANOLI International Journal of Humanities and Linguistics , Volume UIh3MC5UrwhGKptS6jkQ, Issue 1.