Enhanced IoT Intrusion Detection Using an Improved Autoencoder and Adversarial Convolutional Encoders
Abstract
To develop an efficient and intelligent automated intrusion detection system for IoT, this study proposes a malicious network traffic recognition model based on an improved autoencoder and adversarial convolutional encoder (AECE). The model first uses mixed sampling and improved autoencoder for data augmentation. Then, convolutional neural networks and gated recurrent units are used to extract spatial and temporal features. AECE combines the idea of generative adversarial networks to enhance the model's adaptability to complex attack patterns. Finally, experimental validation was conducted on the NSL-KDD, UNSW-NB15, IoT-23, and CSE-CIC-IDS2018 datasets. The results showed that the designed data augmentation algorithm could effectively improve the clustering and classification performance of the dataset, with a minimum Xie Beni value of 0.259, a maximum decrease of 15.88% in Davidson Boudin index, and a maximum improvement of 0.214 in classification accuracy. In the IoT-23 dataset, the highest detection rate of the baseline model was 0.882, while the detection rate of the proposed intrusion detection model was 0.949, with an increase of about 7.6%. At the same time, the model had a minimum loss convergence value of 0.08, a response time of 368.16 ms, and the values of false alarm rate fluctuated between 0.10 and 0.20. The comprehensive values of data traffic per second and packet capture per second confirmed that the model had strong detection ability and efficiency for attack behavior. This study expands the application scope of deep learning in anomaly detection, providing new ideas and methods for improving the security and stability of Internet of Things systems.DOI:
https://doi.org/10.31449/inf.v49i11.8982Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







