Open Access   Article Go Back

Bi-Directional Recurrent Neural Network for IDS in the Internet of Things

Susheel Kumar Tiwari1 , Manmohan Singh2 , Rahul Sharma3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 1227-1235, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.12271235

Online published on Apr 30, 2019

Copyright © Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma, “Bi-Directional Recurrent Neural Network for IDS in the Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1227-1235, 2019.

MLA Style Citation: Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma "Bi-Directional Recurrent Neural Network for IDS in the Internet of Things." International Journal of Computer Sciences and Engineering 7.4 (2019): 1227-1235.

APA Style Citation: Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma, (2019). Bi-Directional Recurrent Neural Network for IDS in the Internet of Things. International Journal of Computer Sciences and Engineering, 7(4), 1227-1235.

BibTex Style Citation:
@article{Tiwari_2019,
author = {Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma},
title = {Bi-Directional Recurrent Neural Network for IDS in the Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1227-1235},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5583},
doi = {https://doi.org/10.26438/ijcse/v7i4.12271235}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.12271235}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5583
TI - Bi-Directional Recurrent Neural Network for IDS in the Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1227-1235
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
139 210 downloads 91 downloads
  
  
           

Abstract

With IoT bringing a large number of day-by-day objects into the digital fold to make them smarter. It is also evident that the IoT is going to transform into a multi-trillion-dollar industry in the near future. However, the reality is that IoT bandwagon rushing full steam ahead is prone to count-less cyber- attack’s in the extremely hostile environment like the internet. Nowadays, standard PC security solutions won’t solve the challenge of privacy and data security transmitted over the internet. In this Paper, we have applied a Bidirectional Recurrent Neural Network to build a security solution with high durability for IoT network security. DL and ML have shown remarkable result in dealing with multimodal and voluminous hetero-generous data in regard’s to intrusion detection especially with the architectures of Recurrent Neural Network’s. Feature selection mechanism were also implemented to help identify and remove non-essential variables from data that does not affect the accuracy of the prediction model. In this case a Random Forest algorithm was implemented over Principal Component Analysis because of flexibility, and easy in using machine learning algorithms that allow production without hyper-parameter tuning, building of multiple decision tree and merging them together to get a more accurate and stable prediction. In this study a novel algorithm (BRNN) out-performed both Recurrent Neural Network and Gated Recurrent Neural Network because it consider both information from the past and the future with back and forward hidden neuron’s.

Key-Words / Index Term

IoT, Recurrent Neural Network’s, Bi-Directional RNN, Intrusion Detection, Deep Learning, Machine Learning.

References

[1] (2020). Retrieved 1 April 2020, from http://kdd.ics.uci.edu/databases/kddcup99 opened april13th.2019.
[2] Ammar, A. (2015). A Decision Tree Classifier for Intrusion Detection Priority Tagging. Journal of Computer And Communications, 03(04), 52-58. https://doi.org/10.4236/jcc.2015.34006
[3] Cs.columbia.edu. (2020). Retrieved 1 April 2020, from http://www.cs.columbia.edu/~mcollins/ibm12.pdf.
[4] Decision-Making, M., Tech, T., FinTech, T., A Women in Tech Study: Motivation, R., Healthcare, T., & Tech, I. et al. (2020). Techopedia - Where IT and Business Meet. Techopedia.com. Retrieved 1 April 2020, from https://www.techopedia.com.
[5] Handa, A., Sharma, A., & Shukla, S. (2019). Machine learning in cybersecurity: A review. Wires Data Mining And Knowledge Discovery, 9(4). https://doi.org/10.1002/widm.1306
[6] Hinton, G., Deng, L., Yu, D., Dahl, G., Mohamed, A., & Jaitly,
N. et al. (2012). Deep Neural Network’s for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups. IEEE Signal Processing Magazine, 29(6), 82-97. https://doi.org/10.1109/msp.2012.2205597
[7] Hochreiter, S., & Schmidhuber, J. (1997). Long Short-Term Memory. Neural Computation, 9(8), 1735-1780. https://doi.org/10.1162/neco.1997.9.8.1735
[8] IEEE International Conference on Acoustics, Speech, and Signal Processing. (2008), 56(8), 4110-4110. https://doi.org/10.1109/tsp.2008.928592
[9] Internet of Things (IoT) news, blogs and analysis - IoTAgenda.com. Internetofthingsagenda.techtarget.com. (2020). Retrieved 1 April 2020, from https://internetofthingsagenda.techtarget.com.
[10] Investopedia. Investopedia. (2020). Retrieved 1 April 2020, from https://www.investopedia.com.
[11] Jia, Y., Wang, M., & Wang, Y. (2019). Network intrusion detection algorithm based on deep neural network’s. IET Information Security, 13(1), 48-53. https://doi.org/10.1049/iet-ifs.2018.5258
[12] Jiang, F., Fu, Y., Gupta, B., Lou, F., Rho, S., Meng, F., & Tian, Z. (2018). Deep Learning based Multi-channel intelligent attack detection for Data Security. IEEE Transactions on Sustainable Computing, 1-1. https://doi.org/10.1109/tsusc.2018.2793284
[13] Samsung Next. Samsung NEXT. (2020). Retrieved 1 April 2020, from https://samsungnext.com.
[14] U.Farooq, M., Waseem, M., Khairi, A., & Mazhar, S. (2015). A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal Of Computer Applications, 111(7), 1-6. https://doi.org/10.5120/19547-1280
[15] (2020). Retrieved 4 April 2020, from https://spiritlifestyle.com/news/
[16] Ashfaq, R., Wang, X., Huang, J., Abbas, H., & He, Y. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484- 497. doi: 10.1016/j.ins.2016.04.019
[17] Breiman, L. (2001). Journal search results - Cite This For Me. Machine Learning, 45(1), 5-32. doi: 10.1023/a:1010933404324
Gori, M., Maggini, M., & Rossi, A. (2016). Neural network training as a dissipative process. Neural Network’s, 81, 72-80. doi: 10.1016/j.neunet.2016.05.005
[18] Gwynne, P. (2015). arXiv analysis lifts the lid on text reuse. Physics World, 28(2), 9-9. doi: 10.1088/2058- 7058/28/2/17
[19] Hasan, M., Nasser, M., Ahmad, S., & Molla, K. (2016). Feature Selection for Intrusion Detection Using Random Forest. Journal Of Information Security, 07(03), 129-140. doi: 10.4236/jis.2016.73009
[20] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. doi: 10.1038/nature14539
[21] Li, Y., & Guo, L. (2007). An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security, 26(7-8), 459-467. doi: 10.1016/j.cose.2007.10.002
[22] Mukkamala, S., Sung, A., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal Of Network And Computer Applications, 28(2), 167-182. doi: 10.1016/j.jnca.2004.01.003
[23] Obeidat, I., Hamadneh, N., Alkasassbeh, M., Almseidin, M., & AlZubi, M. (2019). Intensive Pre-Processing of KDD Cup
99 for Network Intrusion Classification Using Machine Learning Techniques. International Journal Of Interactive Mobile Technologies (Ijim), 13(01), 70. doi: 10.3991/ijim.v13i01.9679
[24] Proti?, D. (2018). Review of KDD Cup `99, NSL-KDD and Kyoto 2006+ datasets. Vojnotehnicki Glasnik, 66(3), 580-596. doi: 10.5937/vojtehg66-16670
[25] Rai, N., & Chansarkar, S. (2017). Cyberspace Security : An Overview for Beginners. Defence Science Journal, 67(4), 483. doi: 10.14429/dsj.67.11542
[26] S, D., & S, R. (2014). PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD
[27] LeCun, Y., Bengio, Y. and Hinton, G., 2015. Deep learning. Nature, 521(7553), pp.436-444.
[28] Murata, N., Yoshizawa, S. and Amari, S., 1994. Network information criterion-determining the number of hidden units for an artificial neural network model. IEEE Transactions on Neural Network’s, 5(6), pp.865-872.
[29] Xu, K., Wang, X., Wei, W., Song, H. and Mao, B., 2016. Toward software defined smart home. IEEE Communications Magazine, 54(5), pp.116-122.
[30] Hasan, M., Nasser, M., Ahmad, S. and Molla, K., 2016. Feature Selection for Intrusion Detection Using Random Forest. Journal of Information Security, 07(03), pp.129-140.