P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis
{"title":"IPCA-SAMKNN:一种资源受限设备的新型网络标识","authors":"P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis","doi":"10.1109/ISMODE56940.2022.10180926","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.","PeriodicalId":335247,"journal":{"name":"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"IPCA-SAMKNN: A Novel Network IDS for Resource Constrained Devices\",\"authors\":\"P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis\",\"doi\":\"10.1109/ISMODE56940.2022.10180926\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.\",\"PeriodicalId\":335247,\"journal\":{\"name\":\"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISMODE56940.2022.10180926\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMODE56940.2022.10180926","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IPCA-SAMKNN: A Novel Network IDS for Resource Constrained Devices
Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.