2021
DOI: 10.11591/ijeecs.v23.i2.pp1059-1067
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating the update of a DL-based IDS for IoT using deep transfer learning

Abstract: <p>Deep learning (DL) models are nowadays broadly applied and have shown outstanding performance in a variety of fields, including our focus topic of "IoTcybersecurity". Deep learning-based intrusion detection system (DL-IDS) models are more fixated and depended on the trained dataset. This poses a problem for these DL-IDS, especially with the known mutation and behavior changes of attacks, which can render them undetected. As a result, the DL-IDShas become outdated. In this work, we present a solution f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

4
6

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…Machine learning (ML) is a subfield of artificial intelligence (AI) that relies on using data and algorithms to mimic the way people learn and improve accuracy over time [18]. ML is a key element of the rapidly expanding area of data science.…”
Section: Machine Learningmentioning
confidence: 99%
“…Machine learning (ML) is a subfield of artificial intelligence (AI) that relies on using data and algorithms to mimic the way people learn and improve accuracy over time [18]. ML is a key element of the rapidly expanding area of data science.…”
Section: Machine Learningmentioning
confidence: 99%
“…There exists a multitude of IDS systems. According to the different taxonomies of IDS systems, we distinguish the network intrusion detection system (NIDS) [19], an IDS capable of analyzing incoming network traffic, and the host intrusion detection system (HIDS), an IDS capable of monitoring sensitive operating system files, and Hybrid IDS solution that combines the two solutions to ease the weakness of the other two categories [20].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…Idrissi et al [ 23 ] also propose the usage of transfer learning to overcome the limitation of traditional DL-based IDS on the detection of novel attacks in IoT environments with few labeled data. Their solution retrains a fine-tuned pretrained model where most of the layers are fixed and just the last ones are trained using a CNN.…”
Section: Related Workmentioning
confidence: 99%