Smart City Gnosys

Smart city article details

Title Securing A Smart Home With A Transformer-Based Iot Intrusion Detection System
ID_Doc 47716
Authors Wang M.; Yang N.; Weng N.
Year 2023
Published Electronics (Switzerland), 12, 9
DOI http://dx.doi.org/10.3390/electronics12092100
Abstract Machine learning (ML)-based Network Intrusion Detection Systems (NIDSs) can classify each network’s flow behavior as benign or malicious by detecting heterogeneous features, including both categorical and numerical features. However, the present ML-based NIDSs are deemed insufficient in terms of their ability to generalize, particularly in changing network environments such as the Internet of Things (IoT)-based smart home. Although IoT devices add so much to home comforts, they also introduce potential risks and vulnerabilities. Recently, many NIDS studies on other IoT scenarios, such as the Internet of Vehicles (IoV) and smart cities, focus on utilizing the telemetry data of IoT devices for IoT intrusion detection. Because when IoT devices are under attack, their abnormal telemetry data values can reflect the anomaly state of those devices. Those telemetry data-based IoT NIDS methods detect intrusion events from a different view, focusing on the attack impact, from the traditional network traffic-based NIDS, which focuses on analyzing attack behavior. The telemetry data-based NIDS is more suitable for IoT devices without built-in security mechanisms. Considering the smart home IoT scenario, which has a smaller scope and a limited number of IoT devices compared to other IoT scenarios, both NIDS views can work independently. This motivated us to propose a novel ML-based NIDS to combine the network traffic-based and telemetry data-based NIDS together. In this paper, we propose a Transformer-based IoT NIDS method to learn the behaviors and effects of attacks from different types of data that are generated in the heterogeneous IoT environment. The proposed method utilizes a self-attention mechanism to learn contextual embeddings for input network features. Based on the contextual embeddings, our method can solve the feature set challenge, including both continuous and categorical features. Our method is the first to utilize both network traffic data and IoT sensors’ telemetry data at the same time for intrusion detection. Experiments reveal the effectiveness of our method on a realistic network traffic intrusion detection dataset named ToN_IoT, with an accuracy of 97.95% for binary classification and 95.78% for multiple classifications on pure network data. With the extra IoT information, the performance of our method has been improved to 98.39% and 97.06%, respectively. A comparative study with existing works shows that our method can achieve state-of-the-art performance on the ToN_IoT dataset. © 2023 by the authors.
Author Keywords deep learning; network intrusion detection systems; network security


Similar Articles


Id Similarity Authors Title Published
6991 View0.903Aljohani R.; Bushnag A.; Alessa A.Ai-Based Intrusion Detection For A Secure Internet Of Things (Iot)Journal of Network and Systems Management, 32, 3 (2024)
33346 View0.901Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
24715 View0.898Ali M.; Pervez S.; Hosseini S.E.; Siddhu M.K.Evaluation And Detection Of Cyberattack In Iot-Based Smart City Networks Using Machine Learning On The Unsw-Nb15 DatasetInternational Journal of Online and Biomedical Engineering, 21, 2 (2025)
32898 View0.896Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
23579 View0.895Prazeres N.; Costa R.L.D.C.; Santos L.; Rabadão C.Engineering The Application Of Machine Learning In An Ids Based On Iot Traffic FlowIntelligent Systems with Applications, 17 (2023)
59592 View0.894Khatkar M.; Kumar K.; Kumar B.Unfolding The Network Dataset To Understand The Contribution Of Features For Detecting Malicious Activities Using Ai/MlMaterials Today: Proceedings, 59 (2022)
9646 View0.893Maniriho P.; Niyigaba E.; Bizimana Z.; Twiringiyimana V.; Mahoro L.J.; Ahmad T.Anomaly-Based Intrusion Detection Approach For Iot Networks Using Machine LearningCENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent Multimedia 2020 (2020)
33032 View0.893Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
33860 View0.891Tyagi K.; Ahlawat A.; Chaudhary H.Iot Network Security: Netflow Traffic Analysis And Attack Classification Using Machine Learning Techniques2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024 (2024)
2052 View0.89Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)