IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0286652.html
   My bibliography  Save this article

Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection

Author

Listed:
  • Demóstenes Zegarra Rodríguez
  • Ogobuchi Daniel Okey
  • Siti Sarah Maidin
  • Ekikere Umoren Udo
  • João Henrique Kleinschmidt

Abstract

Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing rate of IoT device usage is associated with rising security risks resulting from malicious network flows during data exchange between the connected devices. Various security threats have shown high adverse effects on the availability, functionality, and usability of the devices among which denial of service (DoS) and distributed denial of service (DDoS), which attempt to exhaust the capacity of the IoT network (gateway), thereby causing failure in the functionality of the system have been more pronounced. Various machine learning and deep learning algorithms have been used to propose intelligent intrusion detection systems (IDS) to mitigate the challenging effects of these network threats. One concern is that although deep learning algorithms have shown good accuracy results on tabular data, not all deep learning algorithms can perform well on tabular datasets, which happen to be the most commonly available format of datasets for machine learning tasks. Again, there is also the challenge of model explainability and feature selection, which affect model performance. In this regard, we propose a model for IDS that uses attentive mechanisms to automatically select salient features from a dataset to train the IDS model and provide explainable results, the TabNet-IDS. We implement the proposed model using the TabNet algorithm based on PyTorch which is a deep-learning framework. The results obtained show that the TabNet architecture can be used on tabular datasets for IoT security to achieve good results comparable to those of neural networks, reaching an accuracy of 97% on CIC-IDS2017, 95% on CSE-CICIDS2018 and 98% on CIC-DDoS2019 datasets.

Suggested Citation

  • Demóstenes Zegarra Rodríguez & Ogobuchi Daniel Okey & Siti Sarah Maidin & Ekikere Umoren Udo & João Henrique Kleinschmidt, 2023. "Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection," PLOS ONE, Public Library of Science, vol. 18(10), pages 1-25, October.
  • Handle: RePEc:plo:pone00:0286652
    DOI: 10.1371/journal.pone.0286652
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0286652
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0286652&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0286652?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Umar Islam & Ali Muhammad & Rafiq Mansoor & Md Shamim Hossain & Ijaz Ahmad & Elsayed Tag Eldin & Javed Ali Khan & Ateeq Ur Rehman & Muhammad Shafiq, 2022. "Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models," Sustainability, MDPI, vol. 14(14), pages 1-18, July.
    2. Radanliev, Petar & De Roure, David & Nicolescu, Razvan & Huth, Michael & Mantilla Montalvo, Rafael & Cannady, Stacy & Burnap, Peter, 2018. "Future developments in cyber risk assessment for the internet of things," MPRA Paper 92567, University Library of Munich, Germany, revised Sep 2018.
    3. Xiruo Liu & Meiyuan Zhao & Sugang Li & Feixiong Zhang & Wade Trappe, 2017. "A Security Framework for the Internet of Things in the Future Internet Architecture," Future Internet, MDPI, vol. 9(3), pages 1-28, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Valentina Gatteschi & Fabrizio Lamberti & Claudio Demartini & Chiara Pranteda & Víctor Santamaría, 2018. "Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough?," Future Internet, MDPI, vol. 10(2), pages 1-16, February.
    2. Radanliev, Petar & De Roure, Dave & R.C. Nurse, Jason & Nicolescu, Razvan & Huth, Michael & Cannady, Stacy & Mantilla Montalvo, Rafael, 2019. "Cyber Security Framework for the Internet-of-Things in Industry 4.0," MPRA Paper 92565, University Library of Munich, Germany, revised 2019.
    3. Aoqi Xu & Mehdi Darbandi & Danial Javaheri & Nima Jafari Navimipour & Senay Yalcin & Anas A. Salameh, 2023. "The Management of IoT-Based Organizational and Industrial Digitalization Using Machine Learning Methods," Sustainability, MDPI, vol. 15(7), pages 1-28, March.
    4. Niloofar Etemadi & Pieter Van Gelder & Fernanda Strozzi, 2021. "An ISM Modeling of Barriers for Blockchain/Distributed Ledger Technology Adoption in Supply Chains towards Cybersecurity," Sustainability, MDPI, vol. 13(9), pages 1-28, April.
    5. Petar Radanliev & David Roure & Pete Burnap & Omar Santos, 2021. "Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things," The Review of Socionetwork Strategies, Springer, vol. 15(2), pages 381-411, November.
    6. Yin-Yee Leong & Yen-Chih Chen, 2020. "Cyber risk cost and management in IoT devices-linked health insurance," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 45(4), pages 737-759, October.
    7. Traian Mihai Popescu & Alina Madalina Popescu & Gabriela Prostean, 2021. "IoT Security Risk Management Strategy Reference Model (IoTSRM2)," Future Internet, MDPI, vol. 13(6), pages 1-43, June.
    8. Petar Radanliev & David Roure & Max Kleek & Uchenna Ani & Pete Burnap & Eirini Anthi & Jason R. C. Nurse & Omar Santos & Rafael Mantilla Montalvo & La’Treall Maddox, 2021. "Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge," Environment Systems and Decisions, Springer, vol. 41(2), pages 236-247, June.
    9. Jin, Keyan & Zhong, Ziqi & Zhao, Elena Yifei, 2024. "Sustainable digital marketing under big data: an AI random forest model approach," LSE Research Online Documents on Economics 121402, London School of Economics and Political Science, LSE Library.
    10. Yin-Yee Leong & Yen-Chih Chen, 0. "Cyber risk cost and management in IoT devices-linked health insurance," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 0, pages 1-23.
    11. Turlough Guerin, 2022. "Questions that board directors should be asking about emerging governance issues and risk: a practitioner’s view and implications for the extractive industries," Mineral Economics, Springer;Raw Materials Group (RMG);Luleå University of Technology, vol. 35(2), pages 221-237, June.
    12. Radanliev, Petar & De Roure, Dave & Cannady, Stacy & Mantilla Montalvo, Rafael & Nicolescu, Razvan & Huth, Michael, 2018. "Analysing IoT cyber risk for estimating IoT cyber insurance," EconStor Conference Papers 193692, ZBW - Leibniz Information Centre for Economics.
    13. Paolo Giudici & Emanuela Raffinetti, 2021. "Cyber risk ordering with rank-based statistical models," AStA Advances in Statistical Analysis, Springer;German Statistical Society, vol. 105(3), pages 469-484, September.
    14. Ricardo S. Alonso & Inés Sittón-Candanedo & Roberto Casado-Vara & Javier Prieto & Juan M. Corchado, 2020. "Deep Reinforcement Learning for the Management of Software-Defined Networks and Network Function Virtualization in an Edge-IoT Architecture," Sustainability, MDPI, vol. 12(14), pages 1-23, July.
    15. Sanjay Kumar & Rafeeq Ahmed & Salil Bharany & Mohammed Shuaib & Tauseef Ahmad & Elsayed Tag Eldin & Ateeq Ur Rehman & Muhammad Shafiq, 2022. "Exploitation of Machine Learning Algorithms for Detecting Financial Crimes Based on Customers’ Behavior," Sustainability, MDPI, vol. 14(21), pages 1-24, October.
    16. Alptekin Ulutaş & Ieva Meidute-Kavaliauskiene & Ayse Topal & Ezgi Demir, 2021. "Assessment of Collaboration-Based and Non-Collaboration-Based Logistics Risks with Plithogenic SWARA Method," Logistics, MDPI, vol. 5(4), pages 1-14, November.
    17. Muhammad Abbas Khan & Ijaz Ahmad & Anis Nurashikin Nordin & A. El-Sayed Ahmed & Hiren Mewada & Yousef Ibrahim Daradkeh & Saim Rasheed & Elsayed Tag Eldin & Muhammad Shafiq, 2022. "Smart Android Based Home Automation System Using Internet of Things (IoT)," Sustainability, MDPI, vol. 14(17), pages 1-17, August.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0286652. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.