4.2 Article

The robust deep learning-based schemes for intrusion detection in Internet of Things environments

Journal

ANNALS OF TELECOMMUNICATIONS
Volume 76, Issue 5-6, Pages 273-285

Publisher

SPRINGER INTERNATIONAL PUBLISHING AG
DOI: 10.1007/s12243-021-00854-y

Keywords

Adversarial examples; Adversary training; CNN; FGSM; LSTM; GRU

Ask authors/readers for more resources

With the rise of IoT, network attacks have become more diversified and intelligent, highlighting the importance of IDS for network security. This study tested the robustness of three IDS models and found that CNN was the most robust to adversarial examples under normal training, while GRU and LSTM significantly improved their robustness after adversarial training.
With the advent of the Internet of Things (IoT), network attacks have become more diverse and intelligent. In order to ensure the security of the network, Intrusion Detection system (IDS) has become very important. However, when met with the adversarial examples, IDS has itself become no longer secure, and the attackers can increase the success rate of attacks by misleading IDS. Therefore, it is necessary to improve the robustness of the IDS. In this paper, we employ Fast Gradient Sign Method (FGSM) to generate adversarial examples to test the robustness of three intrusion detection models based on convolutional neural network (CNN), long short-term memory (LSTM), and gated recurrent unit (GRU). We employ three training methods: the first is to train the models with normal examples, the second is to train the models directly with adversarial examples, and the last is to pretrain the models with normal examples, and then employ adversarial examples to train the models. We evaluate the performance of the three models under different training methods, and find that under normal training method, CNN is the most robust model to adversarial examples. After adversarial training, the robustness of GRU and LSTM to adversarial examples has greatly been improved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available