• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于物联网网络攻击检测的基于优化堆叠的 TinyML 模型。

An optimized stacking-based TinyML model for attack detection in IoT networks.

作者信息

Sharma Anshika, Rani Shalli, Shabaz Mohammad

机构信息

Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India.

Marwadi University Research Center, Department of Computer Engineering, Faculty of Engineering and Technology, Marwadi University, Rajkot, Gujarat, India.

出版信息

PLoS One. 2025 Aug 1;20(8):e0329227. doi: 10.1371/journal.pone.0329227. eCollection 2025.

DOI:10.1371/journal.pone.0329227
PMID:40748942
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12316202/
Abstract

With the expansion of Internet of Things (IoT) devices, security is an important issue as attacks are constantly gaining more complex. Traditional attack detection methods in IoT systems have difficulty being able to process real-time and access limitations. To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. The experiments have been conducted using the publicly available ToN-IoT dataset, comprising a total of 461,008 labeled instances with 10 types of attacks categories. Some amount of data preprocessing has been done applying methods such as label encoding, feature selection, and data standardization. A stacking ensemble learning technique uses multiple models combining lightweight Decision Tree (DT) and small Neural Network (NN) to aggregate power of the system and generalize. The performance of the model is evaluated by accuracy, precision, recall, F1-score, specificity, and false positive rate (FPR). Experimental results demonstrate that the stacked TinyML model is superior to traditional ML methods in terms of efficiency and detection performance, and its accuracy rate is 99.98%. It has an average inference latency of 0.12 ms and an estimated power consumption of 0.01 mW.

摘要

随着物联网(IoT)设备的扩展,安全成为一个重要问题,因为攻击手段日益复杂。物联网系统中的传统攻击检测方法难以处理实时性和访问限制问题。为应对这些挑战,提出了一种基于堆叠的 Tiny 机器学习(TinyML)模型用于物联网网络中的攻击检测。这确保了高效检测且无额外计算开销。实验使用公开可用的 ToN-IoT 数据集进行,该数据集共有 461,008 个带标签的实例,包含 10 种攻击类别。应用标签编码、特征选择和数据标准化等方法进行了一定量的数据预处理。一种堆叠集成学习技术使用多个模型,结合轻量级决策树(DT)和小型神经网络(NN)来聚合系统能力并进行泛化。通过准确率、精确率、召回率、F1 值、特异性和误报率(FPR)来评估模型性能。实验结果表明,堆叠的 TinyML 模型在效率和检测性能方面优于传统机器学习方法,其准确率为 99.98%。它的平均推理延迟为 0.12 毫秒,估计功耗为 0.01 毫瓦。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/1101695484c3/pone.0329227.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/eb1cce197a37/pone.0329227.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/efd5efc1e188/pone.0329227.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/df549dcd8b9c/pone.0329227.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/1101695484c3/pone.0329227.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/eb1cce197a37/pone.0329227.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/efd5efc1e188/pone.0329227.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/df549dcd8b9c/pone.0329227.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d6f4/12316202/1101695484c3/pone.0329227.g004.jpg

相似文献

1
An optimized stacking-based TinyML model for attack detection in IoT networks.一种用于物联网网络攻击检测的基于优化堆叠的 TinyML 模型。
PLoS One. 2025 Aug 1;20(8):e0329227. doi: 10.1371/journal.pone.0329227. eCollection 2025.
2
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
3
Short-Term Memory Impairment短期记忆障碍
4
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method.通过异常流量检测确保物联网通信安全:遗传算法与集成方法的协同作用
Sensors (Basel). 2025 Jun 30;25(13):4098. doi: 10.3390/s25134098.
5
An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.一种用于识别和缓解软件定义物联网中分布式拒绝服务攻击的优化深度策略。
Network. 2025 Aug;36(3):1047-1078. doi: 10.1080/0954898X.2024.2356852. Epub 2024 Jun 17.
6
An ECG signal processing and cardiac disease prediction approach for IoT-based health monitoring system using optimized epistemic neural network.一种基于物联网的健康监测系统的心电图信号处理及心脏病预测方法,该方法使用优化的认知神经网络。
Electromagn Biol Med. 2025 May 10:1-23. doi: 10.1080/15368378.2025.2503334.
7
Improved model for intrusion detection in the Internet of Things.物联网中入侵检测的改进模型。
Sci Rep. 2025 Jul 1;15(1):21547. doi: 10.1038/s41598-025-92852-6.
8
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
9
Lightweight authentication for IoT devices (LAID) in sustainable smart cities.可持续智慧城市中物联网设备的轻量级认证(LAID)
Sci Rep. 2025 Jul 14;15(1):25410. doi: 10.1038/s41598-025-10181-0.
10
Optimizing security and energy efficiency in IoT-Based health monitoring systems for wireless body area networks.优化用于无线体域网的基于物联网的健康监测系统的安全性和能源效率。
Sci Rep. 2025 Jul 10;15(1):24921. doi: 10.1038/s41598-025-11253-x.

本文引用的文献

1
A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment.一种基于机器学习的认证与入侵检测方案,用于在雾环境中保护物联网用户的匿名性。
PLoS One. 2025 Jun 16;20(6):e0323954. doi: 10.1371/journal.pone.0323954. eCollection 2025.
2
Cloud-edge collaborative data anomaly detection in industrial sensor networks.工业传感器网络中的云边协同数据异常检测
PLoS One. 2025 Jun 11;20(6):e0324543. doi: 10.1371/journal.pone.0324543. eCollection 2025.
3
Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU.
使用深度信念网络-门控循环单元(DBN-GRU)的混合深度学习模型用于准确高效的安卓恶意软件检测
PLoS One. 2025 May 19;20(5):e0310230. doi: 10.1371/journal.pone.0310230. eCollection 2025.
4
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security.利用机器学习有效检测污水池攻击:对能源和安全的影响。
PLoS One. 2025 Mar 17;20(3):e0309532. doi: 10.1371/journal.pone.0309532. eCollection 2025.
5
An intrusion detection model to detect zero-day attacks in unseen data using machine learning.一种使用机器学习检测未知数据中零日攻击的入侵检测模型。
PLoS One. 2024 Sep 11;19(9):e0308469. doi: 10.1371/journal.pone.0308469. eCollection 2024.
6
Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection.使用集成学习和先进特征选择技术实现物联网和雾计算中的优化入侵检测。
PLoS One. 2024 Aug 1;19(8):e0304082. doi: 10.1371/journal.pone.0304082. eCollection 2024.
7
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).基于机器学习模型的恶意统一资源定位器 (URL) 集成分类方法。
PLoS One. 2024 May 31;19(5):e0302196. doi: 10.1371/journal.pone.0302196. eCollection 2024.
8
Imbalanced data preprocessing techniques for machine learning: a systematic mapping study.用于机器学习的不平衡数据预处理技术:一项系统映射研究
Knowl Inf Syst. 2023;65(1):31-57. doi: 10.1007/s10115-022-01772-8. Epub 2022 Nov 9.
9
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.
10
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques.一种使用独热编码、合成少数过采样技术和机器学习技术的内部数据泄露检测方法。
Entropy (Basel). 2021 Sep 27;23(10):1258. doi: 10.3390/e23101258.