Enhanced IoT Security: Multi-Stage Intrusion Detection with Hybrid Residual Networks
Keywords:
IoT Security, Intrusion Detection System (IDS), Hybrid Deep Learning, ResNet34, ResNet50, Feature Extraction, Principal Component Analysis (PCA), Data Preprocessing, Anomaly Detection, Feature Fusion, Attention Mechanism, Network Security, Deep Neural NetworksAbstract
With the rapid expansion of Internet of Things (IoT) networks, intrusion detection has become increasingly critical due to the heterogeneous nature and vulnerability of connected devices. This study proposes a hybrid IoT Intrusion Detection System (IDS) modeled as a multi-stage framework, encompassing data preprocessing, feature extraction, and deep learning-based classification. Missing data are addressed using mean imputation, and categorical and numerical features are standardized through label encoding and Z-score normalization to ensure uniform scaling. Principal Component Analysis (PCA) is applied for dimensionality reduction, preserving essential variance while reducing redundancy. The classification function is implemented using several state-of-the-art deep learning architectures, including MobileNet, Inception, VGG16, VGG19, DenseNet, GoogLeNet, AlexNet, ResNet34, and ResNet50. A hybrid model combining ResNet34 and ResNet50 with feature-level fusion and attention mechanisms is employed to enhance learning depth and feature representation. The system is trained using cross-entropy loss and evaluated on training and testing subsets. Results demonstrate improved detection accuracy, reduced false alarms, and effective classification of normal and anomalous IoT network activities.Downloads
References
Qureshi, K.N.; Jeon, G.; Piccialli, F. Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput. Netw. 2021, 18, 107647. [Google Scholar] [CrossRef]
Gerodimos, A.; Maglaras, L.; Ferrag, M.A.; Ayres, N.; Kantzavelou, I. IoT: Communication protocols and security threats. Internet Things Cyber-Phys. Syst. 2023, 3, 1–13. [Google Scholar] [CrossRef]
Saurabh, K.; Sood, S.; Kumar, A.P.; Singh, U.; Vyas, R.; Vyas, O.P.; Khondoker, R. LBDMIDS: LSTM based deep learning model for intrusion detection systems for IOT networks. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 753–759. [Google Scholar]
Henry, A.; Gautam, S.; Khanna, S.; Rabie, K.; Shongwe, T.; Bhattacharya, P.; Sharma, B.; Chowdhury, S. Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors 2023, 23, 890. [Google Scholar] [CrossRef]
Fitni, Q.R.S.; Ramli, K. Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems. In Proceedings of the 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Bali, Indonesia, 7–8 July 2020; pp. 118–124. [Google Scholar]
Bisyron, W.; Kalamullah, R.; Hendri, M. Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. Int. J. Commun. Netw. Inf. Secur. 2018, 10, 295–304. [Google Scholar]
Shakeela, S.; Shankar, N.S.; Reddy, P.M.; Tulasi, T.K.; Koneru, M.M. Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS. Int. J. Electron. Telecommun. 2021, 67, 267–275. [Google Scholar] [CrossRef]
Musthafa, M.B.; Ali, M.A.; Huda, S.; Kodera, Y.; Kusaka, T.; Nogami, Y. Evaluation of machine learning based optimized feature selection approach and classification methods for Intrusion Detection System. In Proceedings of the 2023 IEEE International Conference on Consumer Electronics, Pingtung, Taiwan, 17–19 July 2023; pp. 285–286. [Google Scholar]
Shah, S.A.R.; Issac, B. Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Gener. Comput. Syst. 2018, 80, 157–170. [Google Scholar] [CrossRef]
Zwane, S.; Tarwireyi, P.; Adigun, M. Ensemble learning approach for flow-based intrusion detection system. In Proceedings of the 2019 IEEE AFRICON, Accra, Ghana, 25–27 September 2019; pp. 1–8. [Google Scholar]
Musthafa, M.B.; Huda, S.; Ali, M.A.; Kodera, Y.; Nogami, Y. Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM. In Proceedings of the 2024 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 5–8 January 2024; pp. 1–5. [Google Scholar]
Berman, D.S.; Buczak, A.L.; Chavis, J.S.; Corbett, C.L. A survey of deep learning methods for cyber security. Information 2019, 10, 122. [Google Scholar] [CrossRef]
Tao, P.; Sun, Z.; Sun, Z. An Improved Intrusion Detection Algorithm Based on GA and SVM. IEEE Access 2018, 6, 13624–13631. [Google Scholar] [CrossRef]
Jaw, E.; Wang, X. Feature Selection and Ensemble-Based Intrusion Detection System: An Efficient and Comprehensive Approach. Symmetry 2021, 13, 1764. [Google Scholar] [CrossRef]
Alshamy, R.; Ghurab, M. A review of big data in network intrusion detection system: Challenges, approaches, datasets, and tools. J. Comput. Sci. Eng. 2020, 8, 62–74. [Google Scholar]
Chalapathy, R.; Chawla, S. Deep Learning for Anomaly Detection: A Survey. arXiv 2019. [Google Scholar] [CrossRef]
Zhou, Y.; Cheng, G.; Jiang, S.; Dai, M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 2020, 174, 107247. [Google Scholar] [CrossRef]
Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar]
Moustafa, N.; Turnbull, B.; Choo, K.K.R. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 2019, 6, 4815–4830. [Google Scholar] [CrossRef]
Ahsan, M.; Gomes, R.; Chowdhury, M.M.; Nygard, K.E. Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. J. Cybersecur. Priv. 2021, 1, 199–218. [Google Scholar] [CrossRef]
Elmasry, W.; Akbulut, A.; Zaim, A.H. Empirical study on multiclass classification-based network intrusion detection. Comput. Intell. 2019, 35, 919–954. [Google Scholar] [CrossRef]
Siraj, M.J.; Ahmad, T.; Ijtihadie, R.M. Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems. Int. J. Adv. Soft Comput. Its Appl. 2022, 14, 185–194. [Google Scholar] [CrossRef]
Kasongo, S.M.; Sun, Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 2020, 7, 1–20. [Google Scholar] [CrossRef]
Sinha, J.; Manollas, M. Efficient deep CNN-BiLSTM model for network intrusion detection. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition, New York, NY, USA, 26–28 June 2020; pp. 223–231. [Google Scholar]
Liu, X.; Li, T.; Zhang, R.; Wu, D.; Liu, Y.; Yang, Z. A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Netw. 2021, 2021, 9947059. [Google Scholar] [CrossRef]
Vaiyapuri, T.; Binbusayyis, A. Application of deep autoencoder as a one-class classifier for unsupervised network intrusion detection: A comparative evaluation. PeerJ Comput. Sci. 2020, 6, e327. [Google Scholar] [CrossRef]
ALFRHAN, A.A.; ALHUSAIN, R.H.; Khan, R.U. SMOTE: Class imbalance problem in intrusion detection system. In Proceedings of the 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 9–10 September 2020; pp. 1–5. [Google Scholar]
Van Der Maaten, L.; Postma, E.O.; van den Herik, H.J. Dimensionality Reduction: A Comparative Review. J. Mach. Learn. Res. 2009, 10, 66–71. [Google Scholar]
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


