Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet

Authors

  • Hailyie Tekleselassie School of Informatics, Wolaita Sodo University, Wolaita sodo, Ethiopia

DOI:

https://doi.org/10.13052/jcsm2245-1439.1145

Keywords:

Intrusion detection, impersonation attack, convolutional neural network, anomaly detection

Abstract

Internet of Things (IoT) networks leverage wireless communication protocol, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into image-based data. This study proposes a novel projection from wireless network attacks data into grid-like data for feeding one of the Convolutional Neural Network (CNN) models, EfficientNet. We define the particular sequence of placing the attribute values in a matrix that would be captured as an image. By combining the most important subset of attributes and EfficientNet, we aim for an accurate and lightweight IDS module deployed in IoT networks. We examine the proposed model using the Wi-Fi attacks dataset, called AWID dataset. We achieve the best performance by a 99.91% F1 score and 0.11% false positive rate. In addition, our proposed model achieved comparable results with other statistical machine learning models, which shows that our proposed model successfully exploited the spatial information of tabular data to maintain detection accuracy. We also successfully maintain the false positive rate of about 0.11%. We also compared the proposed model with other machine learning models, and it is shown that our proposed model achieved comparable results with the other three models. We believe the spatial information must be considered by projecting the tabular data into grid-like data.

Downloads

Download data is not yet available.

Author Biography

Hailyie Tekleselassie, School of Informatics, Wolaita Sodo University, Wolaita sodo, Ethiopia

Hailyie Tekleselassie W/michael holds a BSc degree in Information Systems from University of Gondar, and MSc degree in Information Systems from Addis Ababa University. His current research interests are: Cyber Security, Big Data, AI, ICT and Mobile Computing. He currently Lecturer at Wolaita Sodo University, He is a member of the Ethiopian Space Science Society (ESSS) and the Institution of Electrical and Electronics Engineers (IEEE).

References

B. Tushir, Y. Dalal, B. Dezfouli and Y. Liu, “A quantitative study of ddos and e-ddos attacks on wifi smart home devices,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6282–6292, 2021.

T. Alam, “Cloud-Based IoT Applications and Their Roles in Smart Cities,” Smart Cities, vol. 4, no. 3, pp. 1196–1219. 2021.

S. Brotsis, K. Limniotis, G. Bendiab, N. Kolokotronis and S. Shiaeles, “On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance,” Computer Networks, vol. 191, pp. 108005, 2021.

A. Jalal, M. A. Quaid and M. A Sidduqi, “A Triaxial acceleration-based human motion detection for ambient smart home system,” in 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, pp. 353–358, 2019.

M. Asaad, F. Ahmad, M. S. Alam and M. Sarfraz, “Smart grid and Indian experience: A review,” Resources Policy, vol. 74, pp. 101499, 2021.

R. Guo, “Survey on wifi infrastructure attacks,” International Journal of Wireless and Mobile Computing, vol. 16, no. 2, pp. 97–101, 2019.

S. J. Lee, D. Y. Paul, A. T. Asyhari, Y. Jhi, L. Chermak et al., “IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction,” IEEE Access, vol. 8, pp. 65520–65529, 2020.

L. Qian, Z. Zhu, J. Hu and S. Liu, “Research of SQL injection attack and prevention technology,” in 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF), Harbin, China, pp. 303–306, 2015.

E. Fazeldehkordi, I. S. Amiri and O. A. Akanbi, A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET, 1st ed., Waltham, MA, USA: Syngress, 2016.

P. Ioulianou, V. Vasilakis, I. Moscholios and M. Logothetis, “A signature-based intrusion detection system for the Internet of Things,” in Information and Communication Technology Form (ICTF), Graz, Austria, 2018.

V. V. R. P. V. Jyothsna, R. Prasad and K. M. Prasad, “A Review of Anomaly Based Intrusion Detection Systems,” International Journal of Computer Applications, vol. 28, no. 7, pp. 26–35, 2011.

A. A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, “Intrusion detection system for healthcare systems using medical and network data: A comparison study,” IEEE Access, vol. 8, pp. 106576–106584, 2020.

M. Tan and Q. V. Le, “EfficientNet: rethinking Model Scaling for Convolutional Neural Networks,” in Proceedings of the 36th International Conference on Machine Learning, Long Beach, California, USA, pp. 6105–6114, 2019.

S. Smys, A. Basar and H. Wang, “Hybrid intrusion detection system for internet of Things (IoT),” Journal of ISMAC, vol. 2, no. 04, pp. 190–199, 2020.

M. A. Khan and J. Kim, “Toward developing efficient Conv-AE-based intrusion detection system using heterogeneous dataset,” Electronics, vol. 9, no. 11, pp. 1771, 2020.

X. Li, W. Chen, Q. Zhang and L Wu, “Building auto-encoder intrusion detection system based on random forest feature selection.,” Computers & Security, vol. 95, pp. 101851, 2020.

D. Jin, Y. Lu, J. Qin, Z. Cheng and Z. Mao, “SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism,” Computers & Security, vol. 97, pp. 101984, 2020.

M. A. Rahman, A. T. Asyhari, L. S. Leong, G. B. Satrya, M. H. Tao et al., “Scalable machine learning-based intrusion detection system for IoT-enabled smart cities,” Sustainable Cities and Society, vol. 61, pp. 102324, 2020.

S. N. Mighan and M. Kahani, “A novel scalable intrusion detection system based on deep learning,” International Journal of Information Security, vol. 20, no. 3, pp. 387–403, 2021.

I. Al-Turaiki and N. Altwaijry, “A convolutional neural network forimproved anomaly-based network intrusion detection,” Big Data, vol. 9, no. 3, pp. 233–252, 2021.

M. Popescu and A. Naaji, “Chapter 3 – detection of small tumors of thebrain using medical imaging,” in Handbook of Decision Support Systems for Neurological Disorders. Cambridge, MA, USA: Academic Press, pp. 33–53, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B978012822271300013X

G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, pp. xviii–xxxiv, 1992.

Downloads

Published

2022-11-07

Issue

Section

AI and Machine Learning for intelligent Cybersecurity solutions