Home / Journals / CMC / Online First / doi:10.32604/cmc.2024.051685
Special Issues
Table of Content

Open Access

ARTICLE

MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1
1 College of Information Engineering, University of Engineering of the Chinese People’s Armed Police Force (PAP), Xi’an, 710000, China
2 College of Missile Engineering, Rocket Force Engineering University, Xi’an, 710000, China
* Corresponding Author: Yu Yang. Email: email

Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.051685

Received 12 March 2024; Accepted 16 May 2024; Published online 02 July 2024

Abstract

In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using advanced computer vision techniques to improve classification accuracy. The Markov Transform Field (MTF) method is used to convert 1D network traffic data into 2D images, and then the converted 2D images are filtered by Unsharp Masking to enhance the image details by sharpening; to further improve the accuracy of data classification and detection, unlike using the existing high-performance baseline image classification models, a soft-voting integrated model, which integrates three deep learning models, MobileNet, VGGNet and ResNet, to finally obtain an effective IoT intrusion detection architecture: the MUS model. Four types of experiments are conducted on the publicly available intrusion detection dataset CICIDS2018 and the IoT network traffic dataset N_BaIoT, and the results demonstrate that the accuracy of attack traffic detection is greatly improved, which is not only applicable to the IoT intrusion detection environment, but also to different types of attacks and different network environments, which confirms the effectiveness of the work done.

Keywords

Cyberspace security; intrusion detection; deep learning; Markov Transition Fields (MTF); soft voting integration
  • 91

    View

  • 10

    Download

  • 0

    Like

Share Link