Paper 2022/453

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, and Rafiqul Islam

Abstract

Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and evolving threat types, the traditional machine learning-based IDS must update to cope with the security requirements of the current sustainable IoT environment. In recent years, deep learning, and deep transfer learning have progressed and experienced great success in different fields and have emerged as a potential solution for dependable network intrusion detection. However, new and emerging challenges have arisen related to the accuracy, efficiency, scalability, and dependability of the traditional IDS in a heterogeneous IoT setup. This manuscript proposes a deep transfer learning-based dependable IDS model that outperforms several existing approaches. The unique contributions include effective attribute selection, which is best suited to identify normal and attack scenarios for a small amount of labeled data, designing a dependable deep transfer learning-based ResNet model, and evaluating considering real-world data. To this end, a comprehensive experimental performance evaluation has been conducted. Extensive analysis and performance evaluation show that the proposed model is robust, more efficient, and has demonstrated better performance, ensuring dependability.

Note: Article is currently in the press, appeared in the early access. Thank you.

Metadata
Available format(s)
-- withdrawn --
Category
Applications
Publication info
Published elsewhere. Minor revision.IEEE Transactions on Industrial Informatics
DOI
10.1109/TII.2022.3164770
Keywords
Internet of ThingsDependabilityIntrusion Detection SystemsCybersecurityDeep Transfer Learning.
Contact author(s)
zia @ iut-dhaka edu
History
2022-04-16: withdrawn
2022-04-12: received
See all versions
Short URL
https://ia.cr/2022/453
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.