Journal Home > Volume 29 , Issue 4

Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively.


menu
Abstract
Full text
Outline
About this article

Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security

Show Author's information Chaimae Hazman1Azidine Guezzaz1Said Benkirane1Mourade Azrour2
Higher School of Technology Essaouira, Cadi Ayyad University, Marrakesh 81000, Morocco
Faculty of Sciences and Technologies, Moulay Ismail University, Errachidia 52000, Morocco

Abstract

Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively.

Keywords: intrusion detection, LSTM, IoT security, ML, DL, TPU

References(81)

[1]

M. M. Salim, S. Rathore, and J. H. Park, Distributed denial of service attacks and its defenses in IoT: A survey, J. Supercomput., vol. 76, no. 7, pp. 5320–5363, 2020.

[2]
S. Jeschke, C. Brecher, T. Meisen, D. Özdemir, and T. Eschert, Industrial Internet of Things and cyber manufacturing systems, in Industrial Internet of Things, D. Serpanos and M. Wolf, eds. New York, NY, USA: Springer, 2017, pp. 3–19.
DOI
[3]

L. Sai Ramesh, S. S. Sundar, K. Selvakumar, and S. Sabena, Tracking of wearable IoT devices through WAP using intelligent rule-based location aware approach, J. Inf. Knowl. Manag., vol. 20, p. 2140005, 2021.

[4]

K. Kimani, V. Oduol, and K. Langat, Cyber security challenges for IoT-based smart grid networks, Int. J. Crit. Infr. Prot., vol. 25, pp. 36–49, 2019.

[5]

G. B. Mohammad, S. Shitharth, and P. R. Kumar, Integrated machine learning model for an URL phishing detection, Int. J. Grid Distrib. Comput., vol. 14, no. 1, pp. 513–529, 2021.

[6]

N. Angelova, G. Kiryakova, and L. Yordanova, The great impact of Internet of Things on business, Trakia J. Sci., vol. 15, no. 1, pp. 406–412, 2017.

[7]

G. Thamilarasu and S. Chawla, Towards deep-learning-driven intrusion detection for the Internet of Things, Sensors, vol. 19, no. 9, p. 1977, 2019.

[8]

F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, Internet of Things security: A survey, J. Netw. Comput. Appl., vol. 88, pp. 10–28, 2017.

[9]

P. M. Chanal and M. S. Kakkasageri, Security and privacy in IoT: A survey, Wirel. Pers. Commun., vol. 115, no. 2, pp. 1667–1693, 2020.

[10]
A. Borkar, A. Donode, and A. Kumari, A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (IIDPS), in Proc. 2017 Int. Conf. Inventive Computing and Informatics (ICICI), Coimbatore, India, 2018, pp. 949–953.
DOI
[11]
M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, Anomaly detection model based on gradient boosting and decision tree for IoT environments security, J. Reliab. Intell. Environ., pp. 1–12, 2022.
DOI
[12]
T. T. Bhavani, M. K. Rao, and A. M. Reddy, Network intrusion detection system using random forest and decision tree machine learning techniques, in Proc. 2022 Int. Conf. Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 2022, pp. 1–9.
[13]

J. Gu, L. Wang, H. Wang, and S. Wang, A novel approach to intrusion detection using SVM ensemble with feature augmentation, Comput. Secur., vol. 86, pp. 53–62, 2019.

[14]
Y. Jiang, W. Wang, and C. Zhao, A machine vision-based realtime anomaly detection method for industrial products using deep learning, in Proc. 2019 Chinese Automation Congress (CAC), Hangzhou, China, 2020, pp. 4842–4847.
DOI
[15]
M. A. Istiake Sunny, M. M. S. Maswood, and A. G. Alharbi, Deep learning-based stock price prediction using LSTM and Bi-directional LSTM model, in Proc. 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2020, pp. 87–92.
DOI
[16]
L. Chen, X. Kuang, A. Xu, S. Suo, and Y. Yang, A novel network intrusion detection system based on CNN, in Proc. 2020 Eighth Int. Conf. Advanced Cloud and Big Data (CBD), Taiyuan, China, 2021, pp. 243–247.
DOI
[17]

W. Zhou, J. Li, Y. Chen, and L. C. Shen, Strategic interaction multi-agent deep reinforcement learning, IEEE Access, vol. 8, pp. 119000–119009, 2020.

[18]

X. Yuan, J. Chen, N. Zhang, X. Fang, and D. Liu, A federated bidirectional connection broad learning scheme for secure data sharing in Internet of Vehicles, China Commun., vol. 18, no. 7, pp. 117–133, 2021.

[19]
D. Wang, B. Ding, and D. Feng, Meta reinforcement learning with generative adversarial reward from expert knowledge, in Proc. 2020 IEEE 3rd Int. Conf. Information Systems and Computer Aided Education (ICISCAE), Dalian, China, 2020, pp. 1–7.
DOI
[20]

A. Ashiquzzaman, H. Lee, T. W. Um, and J. Kim, Energy-efficient IoT sensor calibration with deep reinforcement learning, IEEE Access, vol. 8, pp. 97045–97055, 2020.

[21]

M. Ge, N. F. Syed, X. Fu, Z. Baig, and A. Robles-Kelly, Towards a deep learning-driven intrusion detection approach for Internet of Things, Comput. Netw., vol. 186, p. 107784, 2021.

[22]

I. Ullah and Q. H. Mahmoud, Design and development of a deep learning-based model for anomaly detection in IoT networks, IEEE Access, vol. 9, pp. 103906–103926, 2021.

[23]
M. Al-Kasassbeh, M. A. Abbadi, and A. M. Al-Bustanji, LightGBM algorithm for malware detection, Intell. Comput., pp. 391–403, 2020.
DOI
[24]

A. Guezzaz, S. Benkirane, M. Azrour, and S. Khurram, A reliable network intrusion detection approach using decision tree with enhanced data quality, Secur. Commun. Netw., vol. 2021, pp. 1–8, 2021.

[25]

A. Guezzaz, A. Asimi, Y. Asimi, Z. Tbatou, and Y. Sadqi, A lightweight neural classifier for intrusion detection, Gen. Lett. Math., vol. 2, no. 2, pp. 57–66, 2017.

[26]

S. M. Kasongo, An advanced intrusion detection system for IIoT based on GA and tree based algorithms, IEEE Access, vol. 9, pp. 113199–113212, 2021.

[27]
A. Guezzaz, M. Azrour, S. Benkirane, M. Mohy-Eddine, H. Attou, and M. Douiba, A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security, Int. Arab J. Inf. Technol., vol. 19, no. 5, 2022.
DOI
[28]
M. Mohy-Eddine, A. Guezzaz, S. Benkirane, and M. Azrour, An effective intrusion detection approach based on ensemble learning for IIoT edge computing, J. Comput. Virol. Hacking Tech., pp. 1–13, 2022.
DOI
[29]
C. Zhou and R. C. Paffenroth, Anomaly detection with robust deep autoencoders, in Proc. 23rd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Halifax, Canada, 2017, pp. 665–674.
DOI
[30]
D. J. Murray-Smith, Modelling and Simulation of Integrated Systems in Engineering. Amsterdam, the Netherlands: Elsevier, 2012.
DOI
[31]
M. A. Istiake Sunny, M. M. S. Maswood, and A. G. Alharbi, Deep learning-based stock price prediction using LSTM and Bi-directional LSTM model, in Proc. 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2020, pp. 87–92.
DOI
[32]

T. Yigitcanlar, Smart cities in the making, Int. J. Knowl.-Based Develop., vol. 8, no. 3, pp. 201–205, 2017.

[33]

I. M. F. Oomens and B. M. Sadowski, The importance of internal alignment in smart city initiatives: An ecosystem approach, Telecommun. Policy, vol. 43, no. 6, pp. 485–500, 2019.

[34]

M. Lytras, A. Visvizi, and A. Sarirete, Clustering smart city services: Perceptions, expectations, responses, Sustainability, vol. 11, no. 6, p. 1669, 2019.

[35]

L. Nicholls, Y. Strengers, and J. Sadowski, Social impacts and control in the smart home, Nat. Energy, vol. 5, no. 3, pp. 180–182, 2020.

[36]

Z. Xu, Y. Gao, M. Hussain, and P. Cheng, Demand side management for smart grid based on smart home appliances with renewable energy sources and an energy storage system, Math. Probl. Eng., vol. 2020, pp. 1–20, 2020.

[37]

M. Li, H. Tang, A. R. Hussein, and X. Wang, A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community, IEEE Open J. Commun. Soc., vol. 1, pp. 282–292, 2020.

[38]

G. V. Pereira, P. Parycek, E. Falco, and R. Kleinhans, Smart governance in the context of smart cities: A literature review, Inf. Polity, vol. 23, no. 2, pp. 143–162, 2018.

[39]

H. Park and S. B. Rhee, IoT-based smart building environment service for occupants’ thermal comfort, J. Sensors, vol. 2018, pp. 1–10, 2018.

[40]

A. Kusiak, Smart manufacturing, Int. J. Prod. Res., vol. 56, nos. 1&2, pp. 508–517, 2018.

[41]

M. Taylor, Climate-smart agriculture: What is it good for? J. Peasant. Stud., vol. 45, no. 1, pp. 89–107, 2018.

[42]
N. Sharma, I. Kaushik, B. Bhushan, S. Gautam, and A. Khamparia, Applicability of WSN and biometric models in the field of healthcare, in Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks, K. Martin Sagayam, B. Bhushan, A. D. Andrushia, and V. H. C. Albuquerque, eds. Hershey, PA, USA: IGI Global, 2020, pp. 304–329.
DOI
[43]
A. Khamparia, P. K. Singh, P. Rani, D. Samanta, A. Khanna, and B. Bhushan, An Internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning, Trans. Emerg. Telecommun. Technol., vol. 32, no. 7, p. e3963, 2021.
DOI
[44]
S. Goyal, N. Sharma, B. Bhushan, A. Shankar, and M. Sagayam, IoT enabled technology in secured healthcare: Applications, challenges and future directions, in Cognitive Internet of Medical Things for Smart Healthcare, A. E. Hassanien, A. Khamparia, D. Gupta, K. Shankar, and A. Slowik, eds. New York, NY, USA: Springer, 2021, pp. 25–48.
DOI
[45]

C. Vorakulpipat, R. K. L. Ko, Q. Li, and A. Meddahi, Security and privacy in smart cities, Secur. Commun. Netw., vol. 2021, pp. 1–2, 2021.

[46]
Z. Khan, A. Anjum, and S. L. Kiani, Cloud based big data analytics for smart future cities, in Proc. 2013 IEEE/ACM 6th Int. Conf. Utility and Cloud Computing, Dresden, Germany, 2014, pp. 381–386.
DOI
[47]

A. Koubaa, A. Aldawood, B. Saeed, A. Hadid, M. Ahmed, A. Saad, H. Alkhouja, A. Ammar, and M. Alkanhal, Smart palm: An IoT framework for red palm weevil early detection, Agronomy, vol. 10, no. 7, p. 987, 2020.

[48]

M. J. O'Grady, D. Langton, and G. M. P. O'Hare, Edge computing: A tractable model for smart agriculture? AIIA, vol. 3, pp. 42–51, 2019.

[49]

K. Pardini, J. J. P. C. Rodrigues, S. A. Kozlov, N. Kumar, and V. Furtado, IoT-based solid waste management solutions: A survey, J. Sens. Actuator Netw., vol. 8, no. 1, p. 5, 2019.

[50]
J. Dutta, C. Chowdhury, S. Roy, A. I. Middya, and F. Gazi, Towards smart city: Sensing air quality in city based on opportunistic crowd-sensing, in Proc. 18th Int. Conf. Distributed Computing and Networking, Hyderabad, India, 2017.
DOI
[51]

F. Al-Turjman and A. Malekloo, Smart parking in IoT-enabled cities: A survey, Sustain. Cities Soc., vol. 49, p. 101608, 2019.

[52]
R. Varejão Andreão, M. Athayde, J. Boudy, P. Aguilar, I. de Araujo, and R. Andrade, Raspcare: A telemedicine platform for the treatment and monitoring of patients with chronic diseases, in Assistive Technologies in Smart Cities, A. R. G. Ramirez and M. G. G. Ferreira, eds. London, UK: IntechOpen, 2018.
DOI
[53]

P. A. Keane and E. J. Topol, With an eye to AI and autonomous diagnosis, NPJ Digit. Med., vol. 1, p. 40, 2018.

[54]

G. Trencher and A. Karvonen, Stretching “smart”: Advancing health and well-being through the smart city agenda, Local Environ., vol. 24, no. 7, pp. 610–627, 2019.

[55]
F. Tao, J. Cheng, and Q. Qi, IIHub: An industrial internet-of-things hub toward smart manufacturing based on cyber-physical system, IEEE Trans. Ind. Inform., vol. 14, no. 5, pp. 2271–2280, 2018.
DOI
[56]

J. Wan, J. Yang, Z. Wang, and Q. Hua, Artificial intelligence for cloud-assisted smart factory, IEEE Access, vol. 6, pp. 55419–55430, 2018.

[57]
M. Weber and M. Boban, Security challenges of the Internet of Things, in Proc. 2016 39th Int. Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2016, pp. 638–643.
DOI
[58]

W. Elmasry, A. Akbulut, and A. H. Zaim, Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic, Comput. Netw., vol. 168, p. 107042, 2020.

[59]

M. Ahmed, A. N. Mahmood, and J. Hu, A survey of network anomaly detection techniques, J. Netw. Comput. Appl., vol. 60, pp. 19–31, 2016.

[60]

I. Butun, S. D. Morgera, and R. Sankar, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun. Surv. Tutor., vol. 16, no. 1, pp. 266–282, 2014.

[61]

M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, Intrusion detection systems for IoT-based smart environments: a survey, J. Cloud Comput. Adv. Syst. Appl., vol. 7, no. 1, p. 123, 2018.

[62]

J. Ashraf, M. Keshk, N. Moustafa, M. Abdel-Basset, H. Khurshid, A. D. Bakhshi, and R. R. Mostafa, IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities, Sustain. Cities Soc., vol. 72, p. 103041, 2021.

[63]

M. M. Rashid, J. Kamruzzaman, M. Mehedi Hassan, T. Imam, S. Wibowo, S. Gordon, and G. Fortino, Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications, Comput. Secur., vol. 120, p. 102783, 2022.

[64]

T. Gaber, A. El-Ghamry, and A. E. Hassanien, Injection attack detection using machine learning for smart IoT applications, Phys. Commun., vol. 52, p. 101685, 2022.

[65]
C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, lIDS-SIoEL: Intrusion detection framework for IoT-based smart environments security using ensemble learning, Cluster Comput., vol. 54, no. 1, pp. 1–15, 2022.
DOI
[66]

S. Hochreiter and J. Schmidhuber, Long short-term memory, Neural Comput., vol. 9, no. 8, pp. 1735–1780, 1997.

[67]

N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset, Future Gener. Comput. Syst., vol. 100, pp. 779–796, 2019.

[68]

M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning, IEEE Access, vol. 10, pp. 40281–40306, 2022.

[69]
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, in Proc. 2009 IEEE Symp. on Computational Intelligence for Security and Defense Applications, Ottawa, Canada, 2009, pp. 1–6.
DOI
[70]

M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, Network traffic classifier with convolutional and recurrent neural networks for Internet of Things, IEEE Access, vol. 5, pp. 18042–18050, 2017.

[71]
M. Kumar, Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network Using Gated Recurrent Neural Networks (GRU). Dayton, OH, USA: Wright State University, 2017.
[72]
B. Roy and H. Cheung, A deep learning approach for intrusion detection in Internet of Things using Bi-directional long short-term memory recurrent neural network, in Proc. 2018 28th Int. Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 2019, pp. 1–6.
DOI
[73]

A. A. Diro and N. Chilamkurti, Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst., vol. 82, pp. 761–768, 2018.

[74]
M. Roopak, Y. T. Gui, and J. Chambers, Deep learning models for cyber security in IoT networks, in Proc. 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0452–0457.
DOI
[75]
Y. Otoum, D. Liu, and A. Nayak, DL-IDS: A deep learning–based intrusion detection framework for securing IoT, Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3803, 2022.
DOI
[76]
S. Pande, A. Khamparia, D. Gupta, and D. N. H. Thanh, DDOS detection using machine learning technique, in Recent Studies on Computational Intelligence, J. Kacprzyk, ed. Singapore: Springer, 2021, pp. 59–68.
DOI
[77]

S. Pande, A. Khamparia, and D. Gupta, An intrusion detection system for health-care system using machine and deep learning, World J. Eng., vol. 19, no. 2, pp. 166–174, 2022.

[78]

Z. K. Maseer, R. Yusof, S. A. Mostafa, N. Bahaman, O. Musa, and B. A. S. Alrimy, DeepIoT.IDS: hybrid deep learning for enhancing IoT network intrusion detection, Comput. Mater. Continua, vol. 69, no. 3, pp. 3945–3966, 2021.

[79]
A. Guezzaz, A. Asimi, A. Mourade, Z. Tbatou, and Y. Asimi, A multilayer perceptron classifier for monitoring network traffic, in Big Data and Networks Technologies, Y. Farhaoui, ed. New York, NY, USA: Springer, 2020, pp. 262–270.
DOI
[80]
C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, Intrusion detection framework for IoT-based smart environments security using ensemble learning, Cluster Comput., vol. 26, pp. 4069–4083, 2023.
DOI
[81]

M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, An improved anomaly detection model for IoT security using decision tree and gradient boosting, J. Supercomput., vol. 79, no. 3, pp. 3392–3411, 2023.

Publication history
Copyright
Rights and permissions

Publication history

Received: 20 February 2023
Revised: 26 March 2023
Accepted: 14 April 2023
Published: 09 February 2024
Issue date: August 2024

Copyright

© The Author(s) 2024.

Rights and permissions

The articles published in this open access journal are distributed under the terms of theCreative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return