Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence

Bhawana Sharma, Lokesh Sharma, Chhagan Lal

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
30 Downloads (Pure)

Abstract

IoT has gained immense popularity recently with advancements in technologies and big data. IoT network is dynamically increasing with the addition of devices, and the big data is generated within the network, making the network vulnerable to attacks. Thus, network security is essential, and an intrusion detection system is needed. In this paper, we proposed a deep learning-based model for detecting intrusions or attacks in IoT networks. We constructed a DNN model, applied a filter method for feature reduction, and tuned the model with different parameters. We also compared the performance of DNN with other machine learning techniques in terms of accuracy, and the proposed DNN model with weight decay of 0.0001 and dropout rate of 0.01 achieved an accuracy of 0.993, and the reduced loss on the NSL-KDD dataset having five classes. DL models are a black box and hard to understand, so we explained the model predictions using LIME.

Original languageEnglish
Title of host publicationProceedings of 2nd International Conference on Computational Electronics for Wireless Communications - ICCWC 2022
EditorsSanyog Rawat, Sandeep Kumar, Pramod Kumar, Jaume Anguera
Place of PublicationSingapore
PublisherSpringer
Pages315-324
Number of pages10
ISBN (Electronic)978-981-19-6661-3
ISBN (Print)978-981-19-6660-6
DOIs
Publication statusPublished - 2023
Event2nd International Conference on Computational Electronics for Wireless Communications, ICCWC 2022 - Mangalore, India
Duration: 9 Jun 202210 Jun 2022

Publication series

NameLecture Notes in Networks and Systems
Volume554
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

Conference2nd International Conference on Computational Electronics for Wireless Communications, ICCWC 2022
Country/TerritoryIndia
CityMangalore
Period9/06/2210/06/22

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • DL
  • DNN
  • DT
  • Intrusion detection system (IDS)
  • KNN
  • LIME
  • ML
  • SVM

Fingerprint

Dive into the research topics of 'Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence'. Together they form a unique fingerprint.

Cite this