A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection
Haedam Kim,
Suhyun Park,
Hyemin Hong,
Jieun Park and
Seongmin Kim ()
Additional contact information
Haedam Kim: Department of Convergence Security Engineering, Sungshin Women’s University, Seoul 02844, Republic of Korea
Suhyun Park: Department of Convergence Security Engineering, Sungshin Women’s University, Seoul 02844, Republic of Korea
Hyemin Hong: Department of Convergence Security Engineering, Sungshin Women’s University, Seoul 02844, Republic of Korea
Jieun Park: Department of Convergence Security Engineering, Sungshin Women’s University, Seoul 02844, Republic of Korea
Seongmin Kim: Department of Convergence Security Engineering, Sungshin Women’s University, Seoul 02844, Republic of Korea
Future Internet, 2024, vol. 16, issue 3, 1-17
Abstract:
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users’ personal information and privacy, has led to a continuous surge in attacks targeting these devices. However, conventional network-level intrusion detection systems with pre-defined rulesets are gradually losing their efficacy due to the heterogeneous environments of IoT ecosystems. To address such security concerns, researchers have utilized ML-based network-level intrusion detection techniques. Specifically, transfer learning has been dedicated to identifying unforeseen malicious traffic in IoT environments based on knowledge distillation from the rich source domain data sets. Nevertheless, since most IoT devices operate in heterogeneous but small-scale environments, such as home networks, selecting adequate source domains for learning proves challenging. This paper introduces a framework designed to tackle this issue. In instances where assessing an adequate data set through pre-learning using transfer learning is non-trivial, our proposed framework advocates the selection of a data set as the source domain for transfer learning. This selection process aims to determine the appropriateness of implementing transfer learning, offering the best practice in such scenarios. Our evaluation demonstrates that the proposed framework successfully chooses a fitting source domain data set, delivering the highest accuracy.
Keywords: IoT; intrusion detection; transfer learning (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2024
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/16/3/80/pdf (application/pdf)
https://www.mdpi.com/1999-5903/16/3/80/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:16:y:2024:i:3:p:80-:d:1347422
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().