Netinfo Security ›› 2023, Vol. 23 ›› Issue (11): 94-103.doi: 10.3969/j.issn.1671-1122.2023.11.010
Previous Articles Next Articles
LIAO Liyun, ZHANG Bolei, WU Lifa()
Received:
2023-08-10
Online:
2023-11-10
Published:
2023-11-10
CLC Number:
LIAO Liyun, ZHANG Bolei, WU Lifa. IoT Anomaly Detection Model Based on Cost-Sensitive Learning[J]. Netinfo Security, 2023, 23(11): 94-103.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2023.11.010
文献 | 数据集 | 方法 | 具体实现 |
---|---|---|---|
文献[ | KDD CUP99 | 特征选择法 | 信息增益思想 |
文献[ | KDD CUP99 | 数据重采样 | SOINN欠采样 |
文献[ | CSE-CIC-IDS2018 | 数据重采样 | SMOTE过采样 |
文献[ | NSL-KDD, CSE-CIC-IDS2018 | 数据重采样 | DSSTE过采样 |
文献[ | NSL-KDD, UNSW-NB15, CICIDS2017 | 数据重采样 | IGAN过采样 |
文献[ | KDD CUP99, AAGM17, UNSW-NB15, CICIDS2017 | 数据重采样 | GAN过采样 |
文献[ | NSL-KDD, UNSW-NB15 | 数据重采样 | OSS欠采样+SMOTE过采样 |
文献[ | NSL-KDD | 数据重采样 | SMOTE过采样+随机过采样+NearMiss欠采样 |
文献[ | KDD CUP99, UNSW-NB15, CICIDS2017 | 数据重采样 | KNN欠采样+TACGAN过采样 |
文献[ | KDD CUP99, NSL-KDD | 代价敏感学习 | 代价矩阵+ CSSAE |
文献[ | InsectWingbeatSound | 代价敏感学习 | 代价因子+CNN |
流量类别 | 数量 | 占比 |
---|---|---|
Benign | 200000 | 23.8298% |
DDoS-HOIC | 100000 | 11.9149% |
DoS-GoldenEye | 30585 | 3.6442% |
SQL Injection | 53 | 0.0063% |
DoS-Hulk | 93659 | 11.1594% |
Bot | 100000 | 11.9149% |
SSH-Bruteforce | 94237 | 11.2282% |
Brute Force-XSS | 117 | 0.0139% |
DoS-SlowHTTPTest | 100000 | 11.9149% |
Brute Force-Web | 268 | 0.0319% |
DoS-Slowloris | 13475 | 1.6055% |
FTP-BruteForce | 100000 | 11.9149% |
DDoS-LOIC-UDP | 6682 | 0.7962% |
Infiltration | 209 | 0.0249% |
流量类别 | CTIAD | CS-CTIAD | ||
---|---|---|---|---|
精确率 | F1 | 精确率 | F1 | |
Benign | 99.933 % | 99.904 % | 99.998 % | 99.937 % |
DDOS-HOIC | 99.993 % | 99.997 % | 100 % | 100 % |
DoS-GoldenEye | 99.978 % | 99.989 % | 99.989 % | 99.995 % |
SQL Injection | 75.000 % | 75.000 % | 78.947 % | 85.714 % |
DoS-Hulk | 99.982 % | 99.980 % | 99.993 % | 99.986 % |
Bot | 100 % | 99.997 % | 99.990 % | 99.995 % |
SSH-Bruteforce | 100 % | 99.986 % | 100 % | 99.986 % |
Brute Force -XSS | 81.818 % | 90.000 % | 81.818 % | 90.000 % |
DoS-SlowHTTPTest | 99.970 % | 99.985 % | 99.973 % | 99.987 % |
Brute Force -Web | 76.000 % | 84.444 % | 77.451 % | 86.813 % |
DoS-Slowloris | 99.950 % | 99.975 % | 99.950 % | 99.975 % |
FTP-BruteForce | 99.990 % | 99.995 % | 99.977 % | 99.988 % |
DDoS-LOIC-UDP | 100 % | 100 % | 100 % | 100 % |
Infiltration | 54.839 % | 54.839 % | 66.667 % | 80.000 % |
流量类别 | CTIAD | CS-CTIAD | ||
---|---|---|---|---|
精确率 | F1 | 精确率 | F1 | |
Benign | 99.998 % | 99.999 % | 100 % | 100 % |
CC | 99.844 % | 99.902 % | 99.961 % | 99.980 % |
Okiru | 100 % | 99.997 % | 100 % | 99.997 % |
PartOfAHorizontalPortScan | 100 % | 100 % | 100 % | 100 % |
DDoS | 100 % | 100 % | 100 % | 100 % |
HeartBeat | 99.957 % | 99.979 % | 99.957 % | 99.979 % |
Torii | 100 % | 99.130 % | 100 % | 99.712 % |
Miral | 100 % | 100 % | 100 % | 100 % |
FileDownload | 100 % | 85.714 % | 100 % | 100 % |
模型 | CSE-CIC-IDS2018 | IoT-23 | ||||||
---|---|---|---|---|---|---|---|---|
准确率 | 精确率 | 召回率 | F1 | 准确率 | 精确率 | 召回率 | F1 | |
CNN_LSTM[ | 85.778 % | 88.135 % | 98.276 % | 89.937 % | 99.994 % | 99.980 % | 99.870 % | 99.925 % |
TCN_LSTM[ | 99.387 % | 79.727 % | 98.654 % | 82.697 % | 92.481 % | 83.802 % | 85.487 % | 74.843 % |
U-Net[ | 99.961 % | 92.984 % | 98.447 % | 95.334 % | 99.987 % | 99.808 % | 99.931 % | 99.897 % |
RTIDS[ | 99.782 % | 85.023 % | 98.482 % | 88.314 % | 99.948 % | 93.337 % | 97.017 % | 94.780 % |
CS-CTIAD | 99.964 % | 93.197 % | 99.452 % | 95.884 % | 99.998 % | 99.991 % | 99.935 % | 99.963 % |
[1] | JSOF. CVE-2020-11896/CVE-2020-11898 Whitepaper[EB/OL]. (2020-10-25)[2023-05-11]. https://www.jsof-tech.com/wp-content/u-ploads/2020/08/Ripple20_CVE-2020-11901-August20.pdf. |
[2] |
FU Lidong, ZHANG Wenbo, TAN Xiaobo, et al. An Algorithm for Detection of Traffic Attribute Exceptions Based on Cluster Algorithm in Industrial Internet of Things[J]. IEEE Access, 2021, 9: 53370-53378.
doi: 10.1109/ACCESS.2021.3068756 URL |
[3] | LIU Xiangyu, LU Tianliang, DU Yanhui, et al. Lightweight IoT Intrusion Detection Method Based on Feature Selection[J]. Netinfo Security, 2023, 23(1): 66-72. |
刘翔宇, 芦天亮, 杜彦辉, 等. 基于特征选择的物联网轻量级入侵检测方法[J]. 信息网络安全, 2023, 23(1):66-72. | |
[4] | FERRAG A M, MAGLARAS L, MOSCHOYIANNIS S, et al. Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study[EB/OL]. [2023-07-16]. https://doi.org/10.1016/j.jisa.2019.102419. |
[5] | YIN Ying, ZHOU Zhihong, YAO Lihong. Research on LSTM-Based CAN Intrusion Detection Model[J]. Netinfo Security, 2022, 22(12): 57-66. |
银鹰, 周志洪, 姚立红. 基于LSTM的CAN入侵检测模型研究[J]. 信息网络安全, 2022, 22(12):57-66. | |
[6] | TESFAHUN A, BHASKARI D L. Intrusion Detection Using Random Forests Classifier with SMOTE and Feature Reduction[C]// IEEE. 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies. New York: IEEE, 2013: 127-132. |
[7] | WU Shuguang, WANG Hongyan, WANG Yu, et al. Application of SOINN Based Undersampling Method in Network Intrusion Detection[J]. Modern Electronics Technique, 2022, 45(21): 88-92. |
吴署光, 王宏艳, 王宇, 等. 基于SOINN的欠采样方法在网络入侵检测中的应用[J]. 现代电子技术, 2022, 45(21):88-92. | |
[8] |
KARATAS G, DEMIR O, SAHINGOZ O K. Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset[J]. IEEE Access, 2020, 8: 32150-32162.
doi: 10.1109/Access.6287639 URL |
[9] |
LIU Lan, WANG Pengcheng, LIN Jun, et al. Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning[J]. IEEE Access, 2021, 9: 7550-7563.
doi: 10.1109/Access.6287639 URL |
[10] | HUANG Shuokang, LEI Kai. IGAN-IDS: An Imbalanced Generative Adversarial Network towards Intrusion Detection System in Ad-Hoc Networks[EB/OL]. (2020-08-01)[2023-07-16]. https://doi.org/10.1016/j.adhoc.2020.102177. |
[11] |
ANDRESINI G, APPICE A, ROSE L D, et al. GAN Augmentation to Deal with Imbalance in Imaging-Based Intrusion Detection[J]. Future Generation Computer Systems, 2021, 123: 108-127.
doi: 10.1016/j.future.2021.04.017 URL |
[12] |
JIANG Kaiyuan, WANG Wenya, WANG Aili, et al. Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network[J]. IEEE Access, 2020, 8: 32464-32476.
doi: 10.1109/Access.6287639 URL |
[13] |
MA Xiangyu, SHI Wei. AESMOTE: Adversarial Reinforcement Learning with SMOTE for Anomaly Detection[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2): 943-956.
doi: 10.1109/TNSE.2020.3004312 URL |
[14] |
DING Hongwei, CHEN Leiyang, DONG Liang, et al. Imbalanced Data Classification: A KNN and Generative Adversaryal Networks-Based Hybrid Approach for Intrusion Detection[J]. Future Generation Computer Systems, 2022, 131: 240-254.
doi: 10.1016/j.future.2022.01.026 URL |
[15] | TELIKANI A, GANDOMI A H. Cost-Sensitive Stacked Auto-Encoders for Intrusion Detection in the Internet of Things[EB/OL]. [2023-07-16]. https://doi.org/10.1016/j.iot.2019.100122. |
[16] | FUQUA D, RAZZAGHI T. A Cost-Sensitive Convolution Neural Network Learning for Control Chart Pattern Recognition[EB/OL]. (2020-07-15)[2023-07-16]. https://doi.org/10.1016/j.eswa.2020.113275. |
[17] | KIM Y. Convolutional Neural Networks for Sentence Classification[C]// ACL. 2014 Empirical Methods in Natural Language Processing(EMNLP). Stroudsburg: ACL, 2014: 1746-1751. |
[18] |
LIN Tianyang, WANG Yuxin, LIU Xiangyang, et al. A Survey of Transformers[J]. AI Open, 2022, 3: 111-132.
doi: 10.1016/j.aiopen.2022.10.001 URL |
[19] | SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization[C]// INSTICC. 4th International Conference on Information Systems Security and Privacy (ICISSP). Lisbon: SCITEPRESS, 2018: 108-116. |
[20] | GARCIA S, PARMISANO A, ERQUIAGA M J. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic[EB/OL]. [2023-08-10]. https://zenodo.org/record/4743746. |
[21] |
SAHU A K, SHARMA S, TANVEER M, et al. Internet of Things Attack Detection Using Hybrid Deep Learning Model[J]. Computer Communications, 2021, 176(3): 146-154.
doi: 10.1016/j.comcom.2021.05.024 URL |
[22] |
MEZINA A, BURGET R, TRAVIESO-GONZÁLEZ C M. Network Anomaly Detection with Temporal Convolutional Network and U-Net Model[J]. IEEE Access, 2021, 9: 143608-143622.
doi: 10.1109/ACCESS.2021.3121998 URL |
[23] |
WU Zihan, ZHANG Hong, WANG Penghai, et al. RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System[J]. IEEE Access, 2022, 10: 64375-64387.
doi: 10.1109/ACCESS.2022.3182333 URL |
[1] | QIN Zhongyuan, MA Nan, YU Yacong, CHEN Liquan. Network Anomaly Detection Based on Dual Graph Convolutional Network and Autoencoders [J]. Netinfo Security, 2023, 23(9): 1-11. |
[2] | XUE Yu, ZHANG Yixuan. Survey on Deep Neural Architecture Search [J]. Netinfo Security, 2023, 23(9): 58-74. |
[3] | ZHANG Wei, LI Zixuan, XU Xiaoyu, HUANG Haiping. SDP-CoAP: Design of Security Enhanced CoAP Communication Framework Based on Software Defined Perimeter [J]. Netinfo Security, 2023, 23(8): 17-31. |
[4] | LIU Yuxiao, CHEN Wei, ZHANG Tianyue, WU Lifa. Explainable Anomaly Traffic Detection Based on Sparse Autoencoders [J]. Netinfo Security, 2023, 23(7): 74-85. |
[5] | JIANG Yingzhao, CHEN Lei, YAN Qiao. Distributed Denial of Service Attack Detection Algorithm Based on Two-Channel Feature Fusion [J]. Netinfo Security, 2023, 23(7): 86-97. |
[6] | LI Zhihua, WANG Zhihao. IoT Device Identification Method Based on LCNN and LSTM Hybrid Structure [J]. Netinfo Security, 2023, 23(6): 43-54. |
[7] | ZHAO Caidan, CHEN Jingqian, WU Zhiqiang. Automatic Modulation Recognition Algorithm Based on Multi-Channel Joint Learning [J]. Netinfo Security, 2023, 23(4): 20-29. |
[8] | TAN Liuyan, RUAN Shuhua, YANG Min, CHEN Xingshu. Educational Data Classification Based on Deep Learning [J]. Netinfo Security, 2023, 23(3): 96-102. |
[9] | XU Zhanyang, CHENG Luofei, CHENG Jianchun, XU Xiaolong. A Scheme of Optimizing Deep Learning Model Using Bi-ADMM [J]. Netinfo Security, 2023, 23(2): 54-63. |
[10] | CHEN Depeng, LIU Xiao, CUI Jie, ZHONG Hong. Research on Membership Inference Attack Method Based on Double Threshold Function [J]. Netinfo Security, 2023, 23(2): 64-75. |
[11] | HUAN Xintao, MIAO Kaitao, CHEN Wen, WU Changfan. A Robust Wireless Key Generation Method for IoT Devices Based on Autonomous Discarding and Calibration [J]. Netinfo Security, 2023, 23(11): 17-26. |
[12] | SONG Lihua, ZHANG Jinwei, ZHANG Shaoyong. An Adaptive IoT SSH Honeypot Strategy Based on Game Theory Opponent Modeling [J]. Netinfo Security, 2023, 23(11): 38-47. |
[13] | ZHANG Yuchen, LI Lianghui, MA Chenyang, ZHOU Hongwei. A Log Anomaly Detection Method with Variables [J]. Netinfo Security, 2023, 23(10): 16-20. |
[14] | JIA Fan, KANG Shuya, JIANG Weiqiang, WANG Guangtao. Vulnerability Similarity Algorithm Evaluation Based on NLP and Feature Fusion [J]. Netinfo Security, 2023, 23(1): 18-27. |
[15] | LIU Xiangyu, LU Tianliang, DU Yanhui, WANG Jingxiang. Lightweight IoT Intrusion Detection Method Based on Feature Selection [J]. Netinfo Security, 2023, 23(1): 66-72. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||