Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks
Abstract
:1. Introduction
- We design and develop the RL and distributional RL as an intrinsic randomness process to find all possible returns from the immediate rewards and stochastic dynamics policy.
- We provide the GAN model for data balancing and data augmentation for the minor profiles.
- We build the proposed algorithm, which contains the returns of distributional RL using the synthetic data generated by the GAN to empower anomaly detection.
- We perform extensive experiments with the DS2OS dataset to validate the effectiveness of the DRL-GAN in binary and multi-class classification scenarios.
- We discuss the simulation results, which show that the proposed algorithm can improve the performance evaluation rate.
2. Related Work
3. Proposed Approach
3.1. System Model and Problem Formulation
3.2. Data Preparation Module
3.2.1. Overview of Dataset
- -
- Normal: Normal data that are completely correct and accurate.
- -
- Denial of Service: An attacker sends too many packets, flooding the target, and making the service unavailable to the server or other device.
- -
- Scan: The system may be scanned to collect data through hardware, which can lead to data corruption.
- -
- Malicious control: A software vulnerability could allow an attacker to obtain a valid session key or manage to capture network traffic. In this way, a malicious person can take control of the entire system.
- -
- Malicious operation: These attacks are generally caused by malicious software. Malware refers to decoy activities that interfere with the original operation. This malicious operation can adversely affect the performance of the device.
- -
- Spaying: An attacker exploits a vulnerability in the system to break into the system using a backdoor channel and discover important information. In any case, manipulating the data can be a major obstacle to the entire system.
- -
- Data probing: In these types of attacks, malicious nodes create a different type of data instead of the original data.
- -
- Incorrect setup: The incorrect system settings can cause data disruption.
3.2.2. Data Preprocessing
- (A)
- Collecting the data input is the first important step in building the model’s feature selection. This process aims to identify a subset of suitable features that will lead the learning models to higher accuracy and robust detection. In the DS2OS analysis, we discovered some missing values of the type of continuous numerical “Accessed Node Type” included 148 values of “NaN” corresponding to abnormal values, and the categorical nominal value “Value” contained some data that were unaffected, such as “False”, “True”, “Twenty”, and “none” transformed into “0.0”, “1.0”, “20.0”, and “0.0”, respectively. Likewise, the feature “Timestamp” with the continuous numerical value was not considered in this study. Furthermore, the feature “Timestamp” with an ongoing numerical value was not considered in this study as it was removed from the train and test set of the DS2OS dataset to retain only 12 features.
- (B)
- Data encoding refers to the process of transforming categorical “Nominal” data into vectors in such a way as to simplify the treatment task of the inputs and outputs of deep learning approaches. Since there are several paths to encode categorical values to learn the model, the most recommended schemes are label encoding, One Hot encoding, bin-counting, feature hashing, dummy coding, and effect coding techniques [41]. The DS2OS dataset includes nominal and categorical data. However, label encoding has been recommended to perform the conversion as it has the advantage of unifying the number of features; as a result, the dimension of the dataset does not increase.
- (C)
- Data normalization has the benefit of making some machine learning algorithms faster. This phase is only recommended if the features have different value ranges. The purpose of this step is to change the values of the numerical columns of the dataset to a common scale without warping the differences in the value ranges.
3.3. Distributional Reinforcement Learning
- -
- S represents the set of states captured by the IDS; we assume , where denotes “normal”, “Detection”, and “No Detection”.
- -
- A indicates the set of possible actions that can be taken by the IDS, which can be specified as low, medium, high, and critical as a reaction of the IDS according to the degree of risk of an attack [43].
- -
- R is the objective function to be optimized in the system, which allows us to represent the returns of the IDS and to perform an action immediately with the location of reward received in the state s and the action a.
- -
- is the transition of state probability, modeled as a matrix of transition probabilities observed at time t for where and
- -
- is the discount factor in .
3.4. Generator Adversarial Networks(GAN)
3.5. Monitoring and Validation Aspect
Algorithm 1: The DRL-GAN algorithm |
4. Results and Discussion
4.1. Performance Metrics
- -
- Accuracy: The accuracy represents the percentage of normal and abnormal data that the IDS correctly predicted. Accuracy is expressed by
- -
- Precision: The precision describes the ratio of normal recordings that are correctly detected by the IDS to all recordings that the IDS has recognized as normal. Precision is defined by
- -
- Recall: The recall is the percentage of positive recording predicted correctly by the IDS. The recall is calculated as
- -
- F1-score: The F1-score is calculated as the harmonic mean of the precision and recall metrics. The F1-score is determined by
4.2. Performance Evaluation
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Notation
G | Generator network |
C | Critic network |
Parameters of generator or discriminator | |
Parameters of Adam optimizer | |
State captured by the agent at time-slot t | |
Possible actions taken by the agent at time-slot t | |
Reward returned to the agent at time-slot t | |
Transaction of state probability matrix | |
Discount factor, where | |
Bellman operator | |
X | Original Data |
M | Replay memory data set |
z | Random noise vector |
Coefficient of penalty |
References
- Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19, 1977. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Latif, S.; Driss, M.; Boulila, W.; Huma, Z.e.; Jamal, S.S.; Idrees, Z.; Ahmad, J. Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors 2021, 21, 7518. [Google Scholar] [CrossRef] [PubMed]
- Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605. [Google Scholar] [CrossRef]
- Jiang, W. Graph-Based Deep Learning for Communication Networks: A Survey. Comput. Commun. 2022, 185, 40–54. [Google Scholar] [CrossRef]
- Rouzbahani, H.M.; Bahrami, A.H.; Karimipour, H. AI-Enabled Threat Detection and Security Analysis for Industrial IoT; Springer: Berlin/Heidelberg, Germany, 2021; pp. 181–194. [Google Scholar]
- Alzubi, Q.M.; Anbar, M.; Sanjalawe, Y.; Al-Betar, M.A.; Abdullah, R. Intrusion Detection System Based on Hybridizing a Modified Binary Grey Wolf Optimization and Particle Swarm Optimization. Expert Syst. Appl. 2022, 204, 117597. [Google Scholar] [CrossRef]
- Dahou, A.; Abd Elaziz, M.; Chelloug, S.A.; Awadallah, M.A.; Al-Betar, M.A.; Al-qaness, M.A.; Forestiero, A. Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm. Comput. Intell. Neurosci. 2022, 2022, 6473507. [Google Scholar] [CrossRef]
- Otair, M.; Ibrahim, O.T.; Abualigah, L.; Altalhi, M.; Sumari, P. An Enhanced Grey Wolf Optimizer Based Particle Swarm Optimizer for Intrusion Detection System in Wireless Sensor Networks. Wirel. Netw. 2022, 28, 721–744. [Google Scholar] [CrossRef]
- Jouhari, M.; Amhoud, E.M.; Saeed, N.; Alouini, M.S. A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges. arXiv 2022, arXiv:2202.11082. [Google Scholar]
- Benaddi, H.; Ibrahimi, K.; Benslimane, A. Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN. In Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakesh, Morocco, 16–19 October 2018; pp. 1–6. [Google Scholar]
- Benaddi, H.; Ibrahimi, K.; Benslimane, A.; Qadir, J. A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things. In Proceedings of the International Wireless Internet Conference, TaiChung, Taiwan, 26–27 November 2019; pp. 73–87. [Google Scholar]
- Sarker, I.H. Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. SN Comput. Sci. 2021, 2, 154. [Google Scholar] [CrossRef]
- Wu, Y. Robust Learning Enabled Intelligence for the Internet-of-Things: A Survey from the Perspectives of Noisy Data and Adversarial Examples. IEEE Internet Things J. 2020, 8, 9568–9579. [Google Scholar] [CrossRef]
- Lo, W.W.; Layeghy, S.; Sarhan, M.; Gallagher, M.; Portmann, M. E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. In Proceedings of the NOMS 2022–2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022; pp. 1–9. [Google Scholar]
- Zhou, X.; Liang, W.; Li, W.; Yan, K.; Shimizu, S.; Wang, K. Hierarchical Adversarial Attacks against Graph Neural Network Based IoT Network Intrusion Detection System. IEEE Internet Things J. 2021, 9, 9310–9319. [Google Scholar] [CrossRef]
- Ilahi, I.; Usama, M.; Qadir, J.; Janjua, M.U.; Al-Fuqaha, A.; Hoang, D.T.; Niyato, D. Challenges and countermeasures for adversarial attacks on deep reinforcement learning. arXiv 2020, arXiv:2001.09684. [Google Scholar] [CrossRef]
- Zhou, K.; Wang, W.; Huang, L.; Liu, B. Comparative study on the time series forecasting of web traffic based on statistical model and Generative Adversarial model. Knowl.-Based Syst. 2021, 213, 106467. [Google Scholar] [CrossRef]
- Abusnaina, A.; Khormali, A.; Alasmary, H.; Park, J.; Anwar, A.; Meteriz, U.; Mohaisen, A. Breaking graph-based IoT malware detection systems using adversarial examples: Poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 15–17 May 2019; pp. 290–291. [Google Scholar]
- Hiromoto, R.E.; Haney, M.; Vakanski, A. A secure architecture for IoT with supply chain risk management. In Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania, 21–23 September 2017; pp. 431–435. [Google Scholar]
- Martins, N.; Cruz, J.M.; Cruz, T.; Henriques Abreu, P. Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review. IEEE Access 2020, 8, 35403–35419. [Google Scholar] [CrossRef]
- Mavrin, B.; Zhang, S.; Yao, H.; Kong, L.; Wu, K.; Yu, Y. Distributional reinforcement learning for efficient exploration. arXiv 2019, arXiv:1905.06125. [Google Scholar]
- Bellemare, M.G.; Dabney, W.; Munos, R. A distributional perspective on reinforcement learning. arXiv 2017, arXiv:1707.06887. [Google Scholar]
- Hu, W.; Tan, Y. Generating adversarial malware examples for black-box attacks based on gan. arXiv 2017, arXiv:1702.05983. [Google Scholar]
- Lin, Z.; Shi, Y.; Xue, Z. Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv 2018, arXiv:1809.02077. [Google Scholar]
- Belenko, V.; Chernenko, V.; Kalinin, M.; Krundyshev, V. Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In Proceedings of the International Russian Automation Conference (RusAutoCon), Sochi, Russia, 9–16 September 2018; pp. 1–7. [Google Scholar]
- Ferdowsi, A.; Saad, W. Generative adversarial networks for distributed intrusion detection in the internet of things. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Clements, J.; Yang, Y.; Sharma, A.; Hu, H.; Lao, Y. Rallying adversarial techniques against deep learning for network security. arXiv 2019, arXiv:1903.11688. [Google Scholar]
- Yin, C.; Zhu, Y.; Liu, S.; Fei, J.; Zhang, H. An enhancing framework for botnet detection using generative adversarial networks. In Proceedings of the International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China, 26–28 May 2018; pp. 228–234. [Google Scholar]
- Ibitoye, O.; Shafiq, O.; Matrawy, A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Shahriar, M.H.; Haque, N.I.; Rahman, M.A.; Alonso, M., Jr. G-ids: Generative adversarial networks assisted intrusion detection system. arXiv 2020, arXiv:2006.00676. [Google Scholar]
- Usama, M.; Asim, M.; Latif, S.; Qadir, J. Generative Adversarial Networks for Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. In Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 78–83. [Google Scholar]
- Pacheco, Y.; Sun, W. Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. In Proceedings of the ICISSP, Online, 11–13 February 2021; pp. 160–171. [Google Scholar]
- Ullah, I.; Mahmoud, Q.H. A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial Networks. IEEE Access 2021, 9, 165907–165931. [Google Scholar] [CrossRef]
- Lee, C.-K.; Cheon, Y.-J.; Hwang, W.-Y. Studies on the GAN-Based Anomaly Detection Methods for the Time Series Data. IEEE Access 2021, 9, 73201–73215. [Google Scholar] [CrossRef]
- Zhao, S.; Li, J.; Wang, J.; Zhang, Z.; Zhu, L.; Zhang, Y. AttackGAN: Adversarial Attack against Black-Box IDS Using Generative Adversarial Networks. Procedia Comput. Sci. 2021, 187, 128–133. [Google Scholar] [CrossRef]
- Zhang, C.; Costa-Perez, X.; Patras, P. Adversarial Attacks against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. IEEE/ACM Trans. Netw. 2022, 30, 1294–1311. [Google Scholar] [CrossRef]
- Jiang, H.; Lin, J.; Kang, H. FGMD: A Robust Detector against Adversarial Attacks in the IoT Network. Future Gener. Comput. Syst. 2022, 132, 194–210. [Google Scholar] [CrossRef]
- Weinger, B.; Kim, J.; Sim, A.; Nakashima, M.; Moustafa, N.; Wu, K.J. Enhancing IoT Anomaly Detection Performance for Federated Learning. Digit. Commun. Netw. 2022, 8, 314–323. [Google Scholar] [CrossRef]
- Ds2os Traffic Traces. Available online: https://www.kaggle.com/francoisxa/ds2ostraffictraces (accessed on 22 May 2022).
- Pahl, M.-O.; Aubet, F.-X. All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection. In Proceedings of the 14th International Conference on Network and Service Management (CNSM), Rome, Italy, 5–8 November 2018; pp. 72–80. [Google Scholar]
- Khare, S.; Totaro, M. Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home. In Proceedings of the 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, 24–26 June 2020; pp. 56–63. [Google Scholar]
- Benaddi, H.; Ibrahimi, K.; Benslimane, A.; Jouhari, M.; Qadir, J. Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game. IEEE Trans. Veh. Technol. 2022, 71, 11089–11102. [Google Scholar] [CrossRef]
- Maillé, P.; Reichl, P.; Tuffin, B. Of threats and costs: A game- theoretic approach to security risk management. In Performance Models and Risk Management in Communications Systems; Springer: Berlin/Heidelberg, Germany, 2011; pp. 33–53. [Google Scholar]
- Bellman, R.; Kalaba, R. Dynamic programming and statistical communication theory. Proc. Natl. Acad. Sci. USA 1957, 43, 749. [Google Scholar] [CrossRef]
- Ho, J.; Ermon, S. Generative adversarial imitation learning. arXiv 2016, arXiv:1606.03476. [Google Scholar]
- Gulrajani, I.; Ahmed, F.; Arjovsky, M.; Dumoulin, V.; Courville, A.C. Improved training of wasserstein gans. Adv. Neural Inf. Process. Syst. 2017, 379, 5767–5777. [Google Scholar]
Article | Year | Approach | Dataset | Performance Metrics | Main Contribution |
---|---|---|---|---|---|
Hu et al. [23] | 2017 | MalGAN | Standardized malware | TPR | A GAN-based algorithm (MalGAN) to generate adversarial malware examples to attack black-box malware. |
Lin et al. [24] | 2018 | IDSGAN | NSL-KDD | DR, and Evasion Increase Rate (EIR) | Adversarial malicious traffic records generation against the IDS using Wasserstein GAN. |
Belenko et al. [25] | 2018 | ANN | Ian Goodfellow | - | A generative adversarial ANN to detect anomalies in large-scale networks of cyber-physical systems (CPS). |
Ferdowsi et al. [26] | 2019 | SBHAR | AC, PR, and FPR | AC, PR, and FPR | A distributed GAN-based IDS model to detect anomalous behaviors in IoT. |
Clements et al. [27] | 2019 | DL-NIDS | Kitsun | FPR, and FNR | Vulnerability of DL-NIDS to well-designed attacks in the field of adversarial machine learning. |
Yin et al. [28] | 2019 | Bot-GAN | ISCX botnet | AC, PR, FPR, and FM | A framework based on GAN to enhance botnet detection models (Bot-GAN). |
Ibitoye et al. [29] | 2019 | FNN, SNN | Bot-IoT | AC, PR, FPR, FM, MC coefficient, and Cohen Coppa Score | Analyzing adversarial attacks against Feed-Forward Neural Networks (FNNs) and the Self-Normalizing Neural Network (SNN). |
Shahriar et al. [30] | 2020 | G-IDS | NSL-KDD | PR, RC, and FM | A GAN-based intrusion detection system (G-IDS) for detection attacks in cyber-physical systems (CPS) technologies. |
Usama et al. [31] | 2020 | GAN | KDD Cup 99 | AC, PR, RC, and FM | An adversarial ML attack using generative adversarial networks (GANs) to evade the vulnerability of ML algorithms in network IDS. |
Pacheco et Sun [32] | 2021 | MLP, SVM, RF, DT | UNSW-NB15 and Bot-IoT | AC, RC, FM, ROC, and AUC | Evaluation of the effectiveness of adversarial deep learning attacks against contemporary datasets. |
Ullah et Mahmoud [33] | 2021 | cGAN | KDD’99, NSL-KDD, BoT-IoT | AC, PR, RC, TNR, FNR, FPR, and FM | A framework for detecting anomalies in IoT networks using conditional GANs (cGANs). |
Lee et al. [34] | 2021 | MAD-GAN, TAnoGAN | SWaT data | AC, PR, RC, FPR, and FM | Anomaly detection for time series using MAD-GAN and the TAnoGAN. |
Zhao et al. [35] | 2021 | attackGAN | NSL-KDD | DR | An improved adversarial attack model based on a Generated Adversarial Network. |
Zhang et al. [36] | 2022 | Tiki-Taka | CSE-CIC-IDS2018 | AC, PR, RC, and FM | A framework for defending against adversarial attacks on deep learning-based NIDS. |
Jiang et al. [37] | 2022 | FGMD | IoTID, MedBIo | AC, PR, RC, FPR, and FM | An FGMD (Feature Grouping and Multi-Model Fusion Detector) framework against adversarial attacks. |
Weinger et al. [38] | 2022 | FL | TON-IoT and DS2OS | AC, PR, RC, and FM | Improving detection performance for IoT anomaly detection (AD) using Federated Learning (FL). |
Our contribution | 2022 | DRL-GAN | DS2OS | AC, PR, RC, FPR, and FM | Enhance the detection of anomalies and resolve the imbalance data problems in IIoT using DRL-GAN. |
Feature | Type |
---|---|
Accessed node type | Nominal |
Accessed node address | Nominal |
Destination services address | Nominal |
Destination services type | Nominal |
Destination location | Nominal |
Source ID | Nominal |
Source address | Nominal |
Source type | Nominal |
Source location | Nominal |
Normality | Nominal |
Operation | Nominal |
Value | Continuous |
Timestamp | Discrete |
Attack Type | Training Set | Testing Set | Total |
---|---|---|---|
Normal | 260,951 | 86,984 | 347,935 |
DoS | 4335 | 1445 | 5780 |
Scan | 1160 | 387 | 1547 |
Malicious control (MC) | 667 | 222 | 889 |
Malicious operation (MO) | 604 | 201 | 805 |
Spying | 399 | 133 | 532 |
Data probing (DP) | 257 | 86 | 342 |
Wrong setup (WS) | 92 | 31 | 122 |
Proposed Schemes | Accuracy | Precision | F1 Scorel |
---|---|---|---|
Normal DRL | 98.854557 | 98.994024 | 98.904968 |
DRL with GAN | 99.050120 | 99.171315 | 99.091281 |
Proposed Schemes | Accuracy | Precision | F1 Score |
---|---|---|---|
Normal DRL | 98.955132 | 99.565517 | 99.222398 |
DRL with | 98.836863 | 99.312751 | 99.026353 |
DRL with | 98.978414 | 99.585785 | 99.234788 |
DRL with | 99.024045 | 99.620359 | 99.269372 |
Approaches | Training Time (s) | Predicting Time (s) |
---|---|---|
Normal DRL | 1101.45 | 0.52 |
DRL with | 1355.13 | 0.54 |
DRL with | 1367.70 | 0.53 |
DRL with | 1361.48 | 0.54 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Benaddi, H.; Jouhari, M.; Ibrahimi, K.; Ben Othman, J.; Amhoud, E.M. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors 2022, 22, 8085. https://doi.org/10.3390/s22218085
Benaddi H, Jouhari M, Ibrahimi K, Ben Othman J, Amhoud EM. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors. 2022; 22(21):8085. https://doi.org/10.3390/s22218085
Chicago/Turabian StyleBenaddi, Hafsa, Mohammed Jouhari, Khalil Ibrahimi, Jalel Ben Othman, and El Mehdi Amhoud. 2022. "Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks" Sensors 22, no. 21: 8085. https://doi.org/10.3390/s22218085
APA StyleBenaddi, H., Jouhari, M., Ibrahimi, K., Ben Othman, J., & Amhoud, E. M. (2022). Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors, 22(21), 8085. https://doi.org/10.3390/s22218085