• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

面向物联网入侵检测的可解释通用特征集。

Towards an Explainable Universal Feature Set for IoT Intrusion Detection.

机构信息

Computer Science Department, Toronto Metropolitan University, Toronto, ON M5B 2K3, Canada.

School of IT Administration and Security, Seneca College of Applied Arts and Technology, Toronto, ON M2J 2X5, Canada.

出版信息

Sensors (Basel). 2022 Jul 29;22(15):5690. doi: 10.3390/s22155690.

DOI:10.3390/s22155690
PMID:35957249
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9371123/
Abstract

As IoT devices' adoption grows rapidly, security plays an important role in our daily lives. As part of the effort to counter these security threats in recent years, many IoT intrusion detection datasets were presented, such as TON_IoT, BoT-IoT, and Aposemat IoT-23. These datasets were used to build many machine learning-based IoT intrusion detection models. In this research, we present an explainable and efficient method for selecting the most effective universal features from IoT intrusion detection datasets that can help in producing highly-accurate and efficient machine learning-based intrusion detection systems. The proposed method was applied to TON_IoT, Aposemat IoT-23, and IoT-ID datasets and resulted in the selection of six universal network-flow features. The proposed method was tested and produced a high accuracy of 99.62% with a prediction time reduced by up to 70%. To provide better insight into the operation of the classifier, a Shapley additive explanation was used to explain the selected features and to prove the alignment of the explanation with current attack techniques.

摘要

随着物联网设备的快速普及,安全性在我们的日常生活中扮演着重要的角色。近年来,为了应对这些安全威胁,人们提出了许多物联网入侵检测数据集,如 TON_IoT、BoT-IoT 和 Aposemat IoT-23。这些数据集被用于构建许多基于机器学习的物联网入侵检测模型。在这项研究中,我们提出了一种可解释且高效的方法,用于从物联网入侵检测数据集中选择最有效的通用特征,从而帮助生成高精度、高效的基于机器学习的入侵检测系统。该方法应用于 TON_IoT、Aposemat IoT-23 和 IoT-ID 数据集,并从中选择了六个通用网络流特征。该方法经过测试,准确率高达 99.62%,预测时间最多可缩短 70%。为了更好地了解分类器的工作原理,我们使用 Shapley 加法解释来解释所选特征,并证明解释与当前攻击技术的一致性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/587e8cfaf09a/sensors-22-05690-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/25d4d1068f81/sensors-22-05690-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/17982e325041/sensors-22-05690-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/a243508396de/sensors-22-05690-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/1029bfdc0674/sensors-22-05690-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/7012a36a52e8/sensors-22-05690-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/0efb641ce513/sensors-22-05690-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/eb061cee02c6/sensors-22-05690-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/587e8cfaf09a/sensors-22-05690-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/25d4d1068f81/sensors-22-05690-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/17982e325041/sensors-22-05690-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/a243508396de/sensors-22-05690-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/1029bfdc0674/sensors-22-05690-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/7012a36a52e8/sensors-22-05690-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/0efb641ce513/sensors-22-05690-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/eb061cee02c6/sensors-22-05690-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/beee/9371123/587e8cfaf09a/sensors-22-05690-g008.jpg

相似文献

1
Towards an Explainable Universal Feature Set for IoT Intrusion Detection.面向物联网入侵检测的可解释通用特征集。
Sensors (Basel). 2022 Jul 29;22(15):5690. doi: 10.3390/s22155690.
2
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
3
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
4
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
5
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems.基于面向对象分析(OOA)改进的双向长短期记忆(Bi-LSTM)网络:一种用于物联网系统的有效入侵检测框架。
Heliyon. 2024 Apr 13;10(8):e29410. doi: 10.1016/j.heliyon.2024.e29410. eCollection 2024 Apr 30.
6
An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.基于改进 LDA 的 ELM 分类算法在物联网应用中的入侵检测。
Sensors (Basel). 2020 Mar 19;20(6):1706. doi: 10.3390/s20061706.
7
Ensemble learning-based IDS for sensors telemetry data in IoT networks.基于集成学习的物联网网络中传感器遥测数据的 IDS。
Math Biosci Eng. 2022 Jul 25;19(10):10550-10580. doi: 10.3934/mbe.2022493.
8
Explainable Security in SDN-Based IoT Networks.基于 SDN 的物联网网络中的可解释安全。
Sensors (Basel). 2020 Dec 20;20(24):7326. doi: 10.3390/s20247326.
9
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
10
An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection.基于混合元启发式算法的物联网入侵检测有效特征选择模型。
Sensors (Basel). 2022 Feb 11;22(4):1396. doi: 10.3390/s22041396.

引用本文的文献

1
XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning.XRecon:一种基于集成学习的可解释物联网侦察攻击检测系统。
Sensors (Basel). 2023 Jun 2;23(11):5298. doi: 10.3390/s23115298.
2
A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach.一种新型混合优化的健壮 CNN 算法在物联网网络入侵检测方法中的应用。
PLoS One. 2022 Dec 1;17(12):e0278493. doi: 10.1371/journal.pone.0278493. eCollection 2022.

本文引用的文献

1
Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System.基于深度学习和雕鸮优化器的高级特征提取与选择方法在物联网入侵检测系统中的应用。
Sensors (Basel). 2021 Dec 26;22(1):140. doi: 10.3390/s22010140.