• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于特征选择和大语言模型微调的物联网入侵检测框架。

An IoT intrusion detection framework based on feature selection and large language models fine-tuning.

作者信息

Ma Huan, Zhang Wan, Zhang Dalong, Chen Baozhan

机构信息

School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, 450001, China.

Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou, 450066, China.

出版信息

Sci Rep. 2025 Jul 1;15(1):21158. doi: 10.1038/s41598-025-08905-3.

DOI:10.1038/s41598-025-08905-3
PMID:40595342
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12218583/
Abstract

The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the network attack surface, necessitating the deployment of advanced AI (artificial intelligence)-based intrusion detection systems (IDS) to bolster IoT security. But existing methods face two significant challenges: (1) Feature redundancy: Current approaches extract numerous flow-level features to learn attack behavior, resulting in high computational complexity and substantial redundant information. (2) Class imbalance: Limited attack traffic samples hinder models from effectively learning attack patterns. However, existing algorithms typically address only one of these issues, overlooking their interconnection. Therefore, we propose a Feature Selection and Large Language Models (LLMs)-based IoT intrusion detection framework (FSLLM). At its core is a multi-stage feature selection algorithm combining Minimum Redundancy Maximum Relevance algorithm (mRMR) and a Pearson Correlation Coefficient (PCC)-improved Covariance Matrix Adaptation Evolution Strategy algorithm (CMA-ES). This algorithm utilizes the CMA-ES algorithm for feature search while also taking into account the mutual information and collinearity among features, thereby more effectively reducing redundancy features. Subsequently, we employ the selected representative features to fine-tune LLMs and generate additional attack samples. This approach effectively reduces the computational cost of fine-tuning while producing higher-quality samples. Furthermore, we employ Focal Loss (FL) function-improved LightGBM as the classifier to improve detection performance. We evaluate our framework on five IoT intrusion detection datasets: NF-ToN-IoT-v2, NF-UNSW-NB15-v2, NF-BoT-IoT-v2, NF-CSE-CIC-IDS2018-v2, and CIC-ToN-IoT. Experimental results demonstrate that FSLLM achieves comparable or superior accuracy to current state-of-the-art methods while reducing redundant features by over 80%.

摘要

物联网(IoT)设备的迅速激增显著扩大了网络攻击面,因此需要部署基于先进人工智能(AI)的入侵检测系统(IDS)来加强物联网安全。但现有方法面临两个重大挑战:(1)特征冗余:当前方法提取大量流级特征来学习攻击行为,导致计算复杂度高且存在大量冗余信息。(2)类不平衡:有限的攻击流量样本阻碍模型有效学习攻击模式。然而,现有算法通常只解决其中一个问题,而忽略了它们之间的相互联系。因此,我们提出了一种基于特征选择和大语言模型(LLMs)的物联网入侵检测框架(FSLLM)。其核心是一种多阶段特征选择算法,该算法结合了最小冗余最大相关算法(mRMR)和经皮尔逊相关系数(PCC)改进的协方差矩阵自适应进化策略算法(CMA-ES)。该算法利用CMA-ES算法进行特征搜索,同时考虑特征之间的互信息和共线性,从而更有效地减少冗余特征。随后,我们使用选定的代表性特征对大语言模型进行微调并生成额外的攻击样本。这种方法有效降低了微调的计算成本,同时生成了更高质量的样本。此外,我们采用经焦点损失(FL)函数改进的LightGBM作为分类器来提高检测性能。我们在五个物联网入侵检测数据集上评估了我们的框架:NF-ToN-IoT-v2、NF-UNSW-NB15-v2、NF-BoT-IoT-v2、NF-CSE-CIC-IDS2018-v2和CIC-ToN-IoT。实验结果表明,FSLLM在减少80%以上冗余特征的同时,实现了与当前最先进方法相当或更高的准确率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/7e6e1e34d43a/41598_2025_8905_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/6b12e9df8025/41598_2025_8905_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/a58793160b26/41598_2025_8905_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/e3b150c71d26/41598_2025_8905_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/d833fb79b4b2/41598_2025_8905_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/c29b1c99c9b2/41598_2025_8905_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/98c9ed7ee9b5/41598_2025_8905_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/bd129631dd7f/41598_2025_8905_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/d3267f87eb96/41598_2025_8905_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/7e6e1e34d43a/41598_2025_8905_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/6b12e9df8025/41598_2025_8905_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/a58793160b26/41598_2025_8905_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/e3b150c71d26/41598_2025_8905_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/d833fb79b4b2/41598_2025_8905_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/c29b1c99c9b2/41598_2025_8905_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/98c9ed7ee9b5/41598_2025_8905_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/bd129631dd7f/41598_2025_8905_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/d3267f87eb96/41598_2025_8905_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6aca/12218583/7e6e1e34d43a/41598_2025_8905_Fig7_HTML.jpg

相似文献

1
An IoT intrusion detection framework based on feature selection and large language models fine-tuning.一种基于特征选择和大语言模型微调的物联网入侵检测框架。
Sci Rep. 2025 Jul 1;15(1):21158. doi: 10.1038/s41598-025-08905-3.
2
Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis.基于长短期记忆网络的联邦学习在物联网无线传感器网络入侵检测中的应用:多数据集分析
PeerJ Comput Sci. 2025 Mar 28;11:e2751. doi: 10.7717/peerj-cs.2751. eCollection 2025.
3
Smart deep learning model for enhanced IoT intrusion detection.用于增强物联网入侵检测的智能深度学习模型。
Sci Rep. 2025 Jul 1;15(1):20577. doi: 10.1038/s41598-025-06363-5.
4
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
5
X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM.X-FuseRLSTM:一种基于注意力引导双路径特征融合和残差长短期记忆网络的物联网跨域可解释入侵检测框架
Sensors (Basel). 2025 Jun 12;25(12):3693. doi: 10.3390/s25123693.
6
(IoT) Network intrusion detection system using optimization algorithms.使用优化算法的(物联网)网络入侵检测系统
Sci Rep. 2025 Jul 1;15(1):21706. doi: 10.1038/s41598-025-04638-5.
7
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
8
Machine learning for Internet of Things (IoT) device identification: a comparative study.用于物联网(IoT)设备识别的机器学习:一项比较研究。
PeerJ Comput Sci. 2025 May 8;11:e2873. doi: 10.7717/peerj-cs.2873. eCollection 2025.
9
XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems.XAI-XGBoost:一种用于保障医疗物联网系统安全的创新型可解释入侵检测方法。
Sci Rep. 2025 Jul 1;15(1):22278. doi: 10.1038/s41598-025-07790-0.
10
Improved model for intrusion detection in the Internet of Things.物联网中入侵检测的改进模型。
Sci Rep. 2025 Jul 1;15(1):21547. doi: 10.1038/s41598-025-92852-6.

本文引用的文献

1
Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection.基于萤火虫算法并结合机器学习用于入侵检测的无线传感器网络-物联网安全增强
Sci Rep. 2024 Jan 2;14(1):231. doi: 10.1038/s41598-023-50554-x.
2
A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems.关于用于改进物联网安全系统的人工智能算法性能评估的调查。
Sci Rep. 2023 Dec 1;13(1):21255. doi: 10.1038/s41598-023-46640-9.
3
How to Effectively Collect and Process Network Data for Intrusion Detection?
如何有效地收集和处理用于入侵检测的网络数据?
Entropy (Basel). 2021 Nov 18;23(11):1532. doi: 10.3390/e23111532.
4
Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy.基于互信息的特征选择:最大依赖、最大相关和最小冗余准则。
IEEE Trans Pattern Anal Mach Intell. 2005 Aug;27(8):1226-38. doi: 10.1109/TPAMI.2005.159.
5
Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES).降低带协方差矩阵自适应的去随机化进化策略(CMA-ES)的时间复杂度。
Evol Comput. 2003 Spring;11(1):1-18. doi: 10.1162/106365603321828970.