IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning

Abstract With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.

[1]  Yogesh Kumar Dwivedi,et al.  Barriers to the Development of Smart Cities in Indian Context , 2018, Inf. Syst. Frontiers.

[2]  Jianmin Wang,et al.  Dual Transfer Learning , 2012, SDM.

[3]  John Blitzer,et al.  Domain Adaptation with Structural Correspondence Learning , 2006, EMNLP.

[4]  Yuxi Liu,et al.  Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[5]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[6]  John Blitzer,et al.  Biographies, Bollywood, Boom-boxes and Blenders: Domain Adaptation for Sentiment Classification , 2007, ACL.

[7]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[8]  Sang-Heon Kim,et al.  A content service deployment plan for metaverse museum exhibitions - Centering on the combination of beacons and HMDs , 2017, Int. J. Inf. Manag..

[9]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[10]  Robert M. Davison,et al.  Strategic knowledge management failures in small professional service firms in China , 2017, Int. J. Inf. Manag..

[11]  Zhihui Li,et al.  Visual saliency guided complex image retrieval , 2020, Pattern Recognit. Lett..

[12]  Jorge Ernesto Espinosa Oviedo,et al.  Kernel Methods for Improving Text Search Engines Transductive Inference by Using Support Vector Machines , 2017 .

[13]  Hui Xiong,et al.  Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[15]  Yang Li Novel face recognition algorithm based on adaptive 3D local binary pattern features and improved Singular Value Decomposition method , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[16]  Yogesh Kumar Dwivedi,et al.  Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling , 2016, Information Systems Frontiers.

[17]  Yogesh Kumar Dwivedi,et al.  Smart cities: Advances in research - An information systems perspective , 2019, Int. J. Inf. Manag..

[18]  Lars Mathiassen,et al.  Cloud-based business services innovation: A risk management model , 2017, Int. J. Inf. Manag..

[19]  Haoxiang Wang,et al.  High Resolution Remote Sensing Image Denoising Algorithm Based on Sparse Representation and Adaptive Dictionary Learning , 2018 .

[20]  Qiang Yang,et al.  Transfer Learning via Dimensionality Reduction , 2008, AAAI.

[21]  Makarand Hastak,et al.  Social network analysis: Characteristics of online social networks after a disaster , 2018, Int. J. Inf. Manag..

[22]  Paula de Camargo Fiorini,et al.  Information systems and sustainable supply chain management towards a more sustainable society: Where we are and where we are going , 2017, Int. J. Inf. Manag..

[23]  Yogesh Kumar Dwivedi,et al.  Artificial intelligence for decision making in the era of Big Data - evolution, challenges and research agenda , 2019, Int. J. Inf. Manag..

[24]  Zhang Jianpei,et al.  FSFP: Transfer Learning From Long Texts to the Short , 2014 .

[25]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.