Next Article in Journal
Analysis of Pressure Fluctuation Characteristics of Central Swirl Combustors Based on Empirical Mode Decomposition
Next Article in Special Issue
Integrity Verification of Distributed Nodes in Critical Infrastructures
Previous Article in Journal
Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map
Previous Article in Special Issue
ConTra Preference Language: Privacy Preference Unification via Privacy Interfaces
 
 
Article
Peer-Review Record

Transfer-Learning-Based Intrusion Detection Framework in IoT Networks

Sensors 2022, 22(15), 5621; https://doi.org/10.3390/s22155621
by Eva Rodríguez *, Pol Valls, Beatriz Otero, Juan José Costa, Javier Verdú, Manuel Alejandro Pajuelo and Ramon Canal
Reviewer 1: Anonymous
Reviewer 2:
Reviewer 4:
Sensors 2022, 22(15), 5621; https://doi.org/10.3390/s22155621
Submission received: 18 June 2022 / Revised: 22 July 2022 / Accepted: 24 July 2022 / Published: 27 July 2022
(This article belongs to the Special Issue Security, Privacy, and Trust Management in IoT)

Round 1

Reviewer 1 Report

This is a nicely written and organized paper. It has motivated and introduced the problem well. It has also given a thorough overview of the background machine learning concepts that the proposal relies on. 

Unfortunately, as neat as the paper may be from the machine learning point of view, it is doubtful that it contributes to the solution of the attack detection problem in IoT since there is a plethora of heterogeneous, superposed, moving IoT instances in real scenarios.

In such a scenario, the proposed approach would not help tackle the problem because the proposed TL model does not present the means for collecting and analyzing the multiple IoT data flows. Moreover, the paper does not show any performance figure to ensure that the IDS will intruders before they dominate the IoT devices and software artifacts. 

In that sense, it seems that this paper proposal is more a computational tool for analyzing a previously recorded database of attacks than an intrusion detection system for an existing IoT scenario.

I suggest the paper clarify the IDS architecture showing the IDS deployment in heterogeneous IoT network instances and the data collection from the distributed IoT modules. It would be interesting to evaluate how the proposed IDS interacts with the IoT devices, the network infrastructure, and the IoT software components. Furthermore, studying the interactions with intermediation modules, gateways, distributed middleware, and cloud applications is interesting to evaluate how the TL modules operate in a more realistic scenario.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Since the source domain and target domain datasets have different attack distributions, the reviewer doesn't believe that the transfer-learning-based IDS design can work. Specifically, the BOT-IOT dataset includes most data in attack type. By contrast, UNSW-NB15 includes most data is normal. The diversity of attack types in UNSW-NB15 is much more than BoT-IoT (DDoS only). Therefore, to build a profile (assume that it is the attack) from BoT to transfer for usage in UNSW-NB15 is theoretically wrong. If building an attack profile, the source dataset must have wide coverage. Also, if making a normal profile, the source dataset must have a massive number of normal data points. 

Since the fundamental concepts are misleading,  the whole building and testing results cannot be reliable. The authors are encouraged to clarify the architecture design and justify the model parts by visualization. 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

This paper proposes a Transfer Learning (TL) based IDS for the effective detection of zero-day attacks, tailored to 5G IoT scenarios with unbalanced and scarce  labeled datasets. The manuscript has merit but requires a major review for being accepted. However, there are some suggestions to be revised to improve the quality of this paper as follows:

 

1.              Abstract should be clear and check whether all the points mentioned in abstract are addressed in this manuscript. The abstract must summarize the performance evaluation results.

2.              The authors should provide solid motivation for their work based on the existing literature. In addition, the main contributions should be defined as set of bullets at the end of introduction section.

3.              A table should be added to summarized related work and state the approach and result achieved by other research in the introduction.

4.              The paper contains only references before 2022; other years references also need to be added especially of 2021 and 2022.

5.              English usage needs to be improved. Please carefully proofread the paper to get rid of typos and grammar mistakes.

6.              References should follow the template. Please correct them all.

 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 4 Report

In this paper, the authors propose a Transfer Learning (TL) based IDS for the effective detection of zero-day attacks, tailored to 5G IoT scenarios with unbalanced and scarce labeled datasets. Moreover, evaluation work was performed.

To improve the quality of the paper, a few suggestions are as follows.
1. The literature review in Part background and related work is insufficient and a little outdated. Please improve it using recent papers.

[1] S. T. Mehedi, A. Anwar, Z. Rahman, K. Ahmed, and I. Rafiqul, "Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach," IEEE Transactions on Industrial Informatics, 2022.

[2] Y. Fan, Y. Li, M. Zhan, H. Cui, and Y. Zhang, "Iotdefender: A federated transfer learning intrusion detection framework for 5g iot," in 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE), 2020, pp. 88-95: IEEE.

[3] X. Li, Z. Hu, M. Xu, Y. Wang, and J. Ma, "Transfer learning based intrusion detection scheme for Internet of vehicles," Information Sciences, vol. 547, pp. 119-135, 2021.

[4] S. T. Mehedi, A. Anwar, Z. Rahman, and K. Ahmed, "Deep transfer learning based intrusion detection system for electric vehicular networks," Sensors, vol. 21, no. 14, p. 4736, 2021.

2. Figs 1 and 4 is vague. Pls redraw it.

3. A few variables are not defined. Please correct it.
4. Evaluation Platform and environment settings should be described in detail since the performance of the proposed method are evaluated wholly based on the specific experiments.
6. Rewrite the conclusion section in the summarized form. Rewrite the abstract part to tell people what is the main contribution of this paper.

7. Some sentences should be rewritten and some grammar mistakes should be corrected.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

The reviewer found no information about the merged dataset (combining BoT-IoT and UNSW-NB15) in Table 6.

The authors may need to explain how such a method can run through the shared code in [43].  

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Reviewer 3 Report

In my opinion, the manuscript may be accepted. However, some minor changes are needed.
First, some variables in the mathematical framework are not introduced or described in the text. That makes difficult to follow your proposal.
Besides, several format errors are all across your paper. Please, review the manuscript carefully.

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Reviewer 4 Report

this paper can be accepted for publication in this journal.

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Back to TopTop