H Haddad Pajouh
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
Haddad Pajouh, H; Javadian, R; Khayami, R; Dehghantanha, A; Choo, R
Authors
R Javadian
R Khayami
A Dehghantanha
R Choo
Abstract
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure. In this paper, we present a novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks. The proposed model is using component analysis and linear discriminate analysis of dimension reduction module to spate the high dimensional dataset to a lower one with lesser features. We then apply a two-tier classification module utilizing Naïve Bayes and Certainty Factor version of K-Nearest Neighbor to identify suspicious behaviors. The experiment results using NSL-KDD dataset shows that our model outperforms previous models designed to detect U2R and R2L attacks.
Citation
Haddad Pajouh, H., Javadian, R., Khayami, R., Dehghantanha, A., & Choo, R. (2019). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323. https://doi.org/10.1109/TETC.2016.2633228
Journal Article Type | Article |
---|---|
Acceptance Date | Nov 21, 2016 |
Online Publication Date | Nov 29, 2016 |
Publication Date | Jun 5, 2019 |
Deposit Date | Dec 12, 2016 |
Publicly Available Date | Dec 12, 2016 |
Journal | IEEE Transactions on Emerging Topics in Computing |
Print ISSN | 2168-6750 |
Electronic ISSN | 2168-6750 |
Publisher | Institute of Electrical and Electronics Engineers |
Volume | 7 |
Issue | 2 |
Pages | 314-323 |
DOI | https://doi.org/10.1109/TETC.2016.2633228 |
Publisher URL | http://dx.doi.org/10.1109/TETC.2016.2633228 |
Related Public URLs | http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6245516 |
Additional Information | Projects : Privacy4Forensic |
Files
Submission TETC-2016-06-0164 R2.pdf
(978 Kb)
PDF
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search