2023
DOI: 10.1109/jiot.2022.3218339
|View full text |Cite
|
Sign up to set email alerts
|

Joint Semantic Transfer Network for IoT Intrusion Detection

Abstract: In this paper, we propose a Joint Semantic Transfer Network (JSTN) towards effective intrusion detection for large-scale scarcely labelled IoT domain. As a multi-source heterogeneous domain adaptation (MS-HDA) method, the JSTN integrates a knowledge rich network intrusion (NI) domain and another small-scale IoT intrusion (II) domain as source domains, and preserves intrinsic semantic properties to assist target II domain intrusion detection. The JSTN jointly transfers the following three semantics to learn a d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 47 publications
(65 reference statements)
0
8
0
Order By: Relevance
“…The ABRSI model works under the unsupervised heterogeneous DA setting. We follow common notations [10], [25] to define the source NI domain D S as follows:…”
Section: A Model Preliminarymentioning
confidence: 99%
See 3 more Smart Citations
“…The ABRSI model works under the unsupervised heterogeneous DA setting. We follow common notations [10], [25] to define the source NI domain D S as follows:…”
Section: A Model Preliminarymentioning
confidence: 99%
“…We use the deep learning framework PyTorch to implement the ABRSI model. We follow [10], [25] to implement the feature projectors as two-layer neural networks with LeakyRelu activation function, and implement both the shared classifier C and EKL discriminator D as single-layer neural networks. All experiments use a single set of hyperparameters, which are as follows: ρ max = 0.1, δ = 1, τ = 0.005, γ = 0.1, T opN = 3, #PL SR neighbour = 3, α max = 8, α min = 4, ψ = −0.3 and φ = −0.05.…”
Section: B Implementation Detailsmentioning
confidence: 99%
See 2 more Smart Citations
“…I Nternet of Things (IoT) devices become indispensable for various real world applications and innovatively transform several fields such as healthcare [1], [2], etc. However, limited power and computational capability of IoT devices hinder the applicability of powerful security mechanisms, together with relatively infrequent maintenance, making IoT vulnerable to malicious intrusions.…”
Section: Introductionmentioning
confidence: 99%