IPCA-SAMKNN:一种资源受限设备的新型网络标识

P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis
{"title":"IPCA-SAMKNN:一种资源受限设备的新型网络标识","authors":"P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis","doi":"10.1109/ISMODE56940.2022.10180926","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.","PeriodicalId":335247,"journal":{"name":"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"IPCA-SAMKNN: A Novel Network IDS for Resource Constrained Devices\",\"authors\":\"P. Agbedanu, R. Musabe, James Rwigema, Ignace Gatare, Yanis Pavlidis\",\"doi\":\"10.1109/ISMODE56940.2022.10180926\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.\",\"PeriodicalId\":335247,\"journal\":{\"name\":\"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISMODE56940.2022.10180926\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Seminar on Machine Learning, Optimization, and Data Science (ISMODE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMODE56940.2022.10180926","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

传统计算系统中的入侵检测系统(ids)在检测和防范网络攻击方面发挥着重要作用。不出所料,同样的技术也用于检测和防止物联网(IoT)环境中的网络攻击。然而,由于物联网设备的计算限制,传统的基于计算的IDS在物联网设备上部署是具有挑战性的。此外,物联网环境下的IDS应具有分类性能高、模型复杂度低、模型尺寸小的特点。尽管基于物联网的入侵检测取得了许多进展,但开发既能实现高分类性能,又不那么复杂、体积更小的模型仍然很困难。本研究通过使用增量主成分分析(IPCA)和自调整记忆KNN (SAM-KNN)的混合,为物联网系统等资源受限设备提出了一种新的IDS,以开发轻量级机器学习模型来检测物联网系统中的入侵。提出的系统部署在树莓派模型B上,代表资源受限的设备,并使用UNSW-NB15数据集进行评估。实验结果表明,该方法准确率高达98.91%,内存开销分别为1.4%、1.6%和2%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
IPCA-SAMKNN: A Novel Network IDS for Resource Constrained Devices
Intrusion Detection Systems (IDSs) in traditional computing systems have played a significant role in detecting and preventing cyber-attacks. Unsurprisingly, the same technology is used to detect and prevent cyber attacks in Internet of Things (IoT) environments. However, due to the computational constraints of IoT devices, traditional computing-based IDS is challenging to deploy on IoT devices. Moreover, IDS for IoT environments should have high classification performance, low complexity models, and small model sizes. Despite numerous advances in IoT-based intrusion detection, developing models that achieve high classification performance while being less complex and smaller in size remains difficult. This study proposes a novel IDS for resource-constrained devices like IoT systems by using a blend of incremental principal component analysis (IPCA) and Self Adjusting Memory KNN (SAM-KNN) to develop a lightweight machine learning model to detect intrusions in IoT systems. The proposed system was deployed on a Raspberry Pi Model B, representing a resource-constrained device, and evaluated using the UNSW-NB15 dataset. The experimental results show a superior accuracy of 98.91%, a memory overhead of 1.4%, 1.6% and 2% overhead for CPU and energy, respectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信