2022
DOI: 10.3390/fi15010009
|View full text |Cite
|
Sign up to set email alerts
|

HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security

Abstract: This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks’ security has become a crucial issue. Anomaly-based intrusion detection systems (IDS) using machine learning have recently gained increased popularity due to their generation’s ability to detect unseen attacks. However, the deployment of anomaly-based AI-assisted IDS for IoT devices is computationally exp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…Here, a hierarchical decisionmaking approach is taken for real-time IoT network intrusion detection. 3) NN2023 [36]: An NN accelerator working a clock frequency of 100 MHz. This accelerator was extended from NN2021 for a heterogeneous hardware-based network intrusion detection framework.…”
Section: Results Of Hardware Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, a hierarchical decisionmaking approach is taken for real-time IoT network intrusion detection. 3) NN2023 [36]: An NN accelerator working a clock frequency of 100 MHz. This accelerator was extended from NN2021 for a heterogeneous hardware-based network intrusion detection framework.…”
Section: Results Of Hardware Implementationmentioning
confidence: 99%
“…Lastly, we evaluated the inference time of the proposed IDS when deployed on the PYNQ-Z2. Here, to facilitate a fair comparison, we performed the inference task on 22,544 records (similar to previous studies [9], [10], [36]). In this evaluation, in addition to the above four accelerators, we also compared a few software implementations of IDSs on an embedded microprocessor (i.e., an ARM Cortex-A9, which is deployed on the PYNQ-Z2) and a desktop PC (with an Intel Core i7 CPU).…”
Section: Results Of Hardware Implementationmentioning
confidence: 99%
“…While this makes sense, since cybersecurity has been dominated by network-based security for decades, it is imperative to consider security from as many points of view as possible in the modern cyber threat topography. IoT 23 [31] Network Packets 2020 [32][33][34] N/A Derived from the 1998 Defence Advanced Research Project Agency (DARPA) dataset [35], the Knowledge Discovery and Data Mining (KDD) 1999 dataset was created to be used in the development of security-focused ML [10,11]. In essence, the KDD dataset transforms the DARPA dataset's network traces into a collection of features found in the connection between two hosts, with each connection constituting its own record in the dataset.…”
Section: Related Workmentioning
confidence: 99%
“…Even though training FCNNs and CNNs on MCUs is now feasible, complex arithmetic operations (e.g., matrix multiplication) are still performed that are challenging for MCUs. With customized hardware accelerators, complex calculations are performed faster which saves resources and energy [25], [26], [27]. However, none of the existing developments enable a modular structure to insert custom hardware accelerators in their framework.…”
Section: Introductionmentioning
confidence: 99%