Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks.

Josue Genaro Almaraz-Rivera, Jose Antonio Cantoral-Ceballos, Juan Felipe Botero
Author Information
  1. Josue Genaro Almaraz-Rivera: Tecnologico de Monterrey, School of Engineering and Sciences, Monterrey 64849, Nuevo Leon, Mexico. ORCID
  2. Jose Antonio Cantoral-Ceballos: Tecnologico de Monterrey, School of Engineering and Sciences, Monterrey 64849, Nuevo Leon, Mexico. ORCID
  3. Juan Felipe Botero: Universidad de Antioquia, Electronics and Telecommunications Engineering Department, GITA-Lab, Medellin 050010, Antioquia, Colombia. ORCID

Abstract

The Internet of Things (IoT), projected to exceed 30 billion active device connections globally by 2025, presents an expansive attack surface. The frequent collection and dissemination of confidential data on these devices exposes them to significant security risks, including user information theft and denial-of-service attacks. This paper introduces a smart, network-based Intrusion Detection System (IDS) designed to protect IoT networks from distributed denial-of-service attacks. Our methodology involves generating synthetic images from flow-level traffic data of the Bot-IoT and the LATAM-DDoS-IoT datasets and conducting experiments within both supervised and self-supervised learning paradigms. Self-supervised learning is identified in the state of the art as a promising solution to replace the need for massive amounts of manually labeled data, as well as providing robust generalization. Our results showcase that self-supervised learning surpassed supervised learning in terms of classification performance for certain tests. Specifically, it exceeded the F1 score of supervised learning for attack detection by 4.83% and by 14.61% in accuracy for the multiclass task of protocol classification. Drawing from extensive ablation studies presented in our research, we recommend an optimal training framework for upcoming contrastive learning experiments that emphasize visual representations in the cybersecurity realm. This training approach has enabled us to highlight the broader applicability of self-supervised learning, which, in some instances, outperformed supervised learning transferability by over 5% in precision and nearly 1% in F1 score.

Keywords

References

  1. Sensors (Basel). 2023 Feb 24;23(5): [PMID: 36904721]
  2. Sensors (Basel). 2022 Aug 15;22(16): [PMID: 36015854]
  3. Sensors (Basel). 2022 Sep 30;22(19): [PMID: 36236531]
  4. Sensors (Basel). 2022 May 14;22(10): [PMID: 35632153]
  5. Sensors (Basel). 2021 Jan 27;21(3): [PMID: 33513902]
  6. Entropy (Basel). 2022 Apr 14;24(4): [PMID: 35455214]
  7. Curr Issues Mol Biol. 2022 Nov 29;44(12):5963-5985 [PMID: 36547067]
  8. Sensors (Basel). 2022 Apr 28;22(9): [PMID: 35591056]
  9. Neural Netw. 2024 Apr;172:106106 [PMID: 38232432]
  10. Arch Comput Methods Eng. 2023;30(4):2761-2775 [PMID: 36713767]

Word Cloud

Created with Highcharts 10.0.0learningIoTsupervisedself-superviseddataattacksattackdenial-of-serviceIntrusionDetectionSystemnetworksexperimentsclassificationF1scoretrainingcontrastiveDDoSInternetThingsprojectedexceed30billionactivedeviceconnectionsglobally2025presentsexpansivesurfacefrequentcollectiondisseminationconfidentialdevicesexposessignificantsecurityrisksincludinguserinformationtheftpaperintroducessmartnetwork-basedIDSdesignedprotectdistributedmethodologyinvolvesgeneratingsyntheticimagesflow-leveltrafficBot-IoTLATAM-DDoS-IoTdatasetsconductingwithinparadigmsSelf-supervisedidentifiedstateartpromisingsolutionreplaceneedmassiveamountsmanuallylabeledwellprovidingrobustgeneralizationresultsshowcasesurpassedtermsperformancecertaintestsSpecificallyexceededdetection483%1461%accuracymulticlasstaskprotocolDrawingextensiveablationstudiespresentedresearchrecommendoptimalframeworkupcomingemphasizevisualrepresentationscybersecurityrealmapproachenabledushighlightbroaderapplicabilityinstancesoutperformedtransferability5%precisionnearly1%EnhancingNetworkSecurity:UnveilingPowerSelf-SupervisedLearningAttackscomputervisiondeep

Similar Articles

Cited By