0% found this document useful (0 votes)
6 views39 pages

Green AI

The document presents a research study on Green AI for threat detection in IoT networks, focusing on developing an energy-efficient AI framework that minimizes carbon footprint while ensuring robust security. It outlines the methodology, including data processing, model design using XGBoost, and energy optimization techniques like pruning and quantization. The study emphasizes real-time detection capabilities and scalability for diverse IoT ecosystems, achieving high accuracy and performance metrics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views39 pages

Green AI

The document presents a research study on Green AI for threat detection in IoT networks, focusing on developing an energy-efficient AI framework that minimizes carbon footprint while ensuring robust security. It outlines the methodology, including data processing, model design using XGBoost, and energy optimization techniques like pruning and quantization. The study emphasizes real-time detection capabilities and scalability for diverse IoT ecosystems, achieving high accuracy and performance metrics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Green AI for Threat Detection:

A Sustainable Approach to
Securing IoT Networks
Table of contents
Research Suggested
01 Topic
03 Methodology
What is our Research Topic Out Suggested Methodology,
and introduction Model Evaluation, Deployment

Our Model
02 Objective
04 Evaluation
We have discussed aboud our
Our objective and goals
Model Evaluation, Deployment
and Comparative Study
Research
01 Objective
Green AI for Threat Detection:
A Sustainable Approach to
Securing IoT Networks
Green AI for Threat Detection:
A Sustainable Approach to
Securing IoT Networks
Green AI for Threat Detection:
A Sustainable Approach to Securing IoT
Networks

Green AI,is a more environmentally friendly approach to AI that aims


to reduce the carbon footprint of AI systems. It uses energy-efficient
algorithms and models to reduce the amount of energy consumed by
AI systems
Green AI for Threat Detection:
A Sustainable Approach to Securing IoT
Networks
THREATS
Physical Threats
Psychological Threats
Social Threats
Economic Threats

cyber security Threats


Green AI for Threat Detection:
A Sustainable Approach to Securing IoT
Networks

The process of identifying potential security


risks to organizational and personal digital
assets
Introduction
Threats of IoT Network
Distributed Denial-of-Service
Harnessing the power of Green AI, this (DDoS) Attacks
study revolutionizes IoT threat Man-in-the-Middle (MITM)
detection by blending sustainability Attacks
with robust security, ensuring eco-
friendly protection for interconnected Routing Attacks
etc.
networks.
Distributed Denial-of-
Service (DDoS) Attacks
Man-in-the-Middle (MITM)
Attacks
Hacker

User Server

IOT Devices(End devices) Hacker


Routing Attacks
Our
02 Objective
Our Objectives
Develop an energy-efficient AI-based framework
for real-time IoT threat detection without
compromising accuracy.
Implement Green AI principles like model pruning and
quantization to minimize computational costs and
carbon footprint.
Design scalable solutions for seamless deployment in
edge and cloud environments tailored to diverse IoT
ecosystems.
Suggested
03 Methodology
Our Suggested Methodology

Model Design Energy- Evaluation and


Data
Efficiency Deployment
Processing
Optimization
Data Processing
Dataset Preparation: Used an authentic labaled
dataset with class balancing techniques to
comprehensively represent IoT threat scenarios.

Feature Extraction and Normalization: Extract key


features like packet size and protocol type, applying
dimensionality reduction (e.g., PCA) and
normalization to streamline data for efficient
modeling
Dataset Selection and Authenticity
We have used the Aposemat IoT-23
dataset by the Avast AIC laboratory
with the funding of Avast Software.

Dataset link: https://www.stratosphereips.org/datasets-iot23


Dataset Pruning and Quantizing
Data pruning and quantizing are used to enhance energy
efficiency. Pruning removes redundant model weights, reducing
complexity and making the model lightweight, while quantizing
converts high-precision values to lower-precision formats,
significantly reducing memory use and speeding up computations.
These techniques ensure the model operates efficiently on low-
power hardware, aligning with Green AI principles.
Dataset Pruning and Quantizing
Fields for Pruning
id.orig_h, id.resp_h (Origin/Response Host)
local_orig / local_resp (Local Origin/Response)
missed_bytes
tunnel_parents
Fields for Quantizing
Duration
orig_bytes / resp_bytes (Origin/Response Bytes)
orig_pkts / resp_pkts (Origin/Response Packets)
ts (Timestamp)
id.orig_p / id.resp_p (Origin/Response Port)
Dataset Labels
All labels in the dataset

Cleaned
Dataset
Feature Extraction
Feature extraction focuses on key
attributes like packet size,
protocol type, flow duration, and
source/destination ports to
identify patterns of malicious
behavior. By selecting these
relevant features, the process
reduces noise and redundancy,
ensuring efficient and accurate
threat detection.
Model Design
The model design utilizes the
XGBoost Algorithm, integrating key
IoT features like packet size, protocol
type, and flow duration. Preprocessing
includes handling missing data,
encoding categorical features, and
scaling numerical values.
Hyperparameter tuning and stratified
splits ensure optimal performance and
balanced learning, enabling efficient
and accurate threat detection in IoT
networks.
Energy-Efficiency Optimization
This research optimizes energy efficiency by utilizing XGBoost with
selected hyperparameters, including a learning rate of 0.1, a maximum
depth of 6, and 100 estimators, to balance computational cost and
performance. Efficient data preprocessing techniques, such as label
encoding for categorical features, scaling for numerical data, and
handling missing values, streamline input processing. Early stopping
further reduces unnecessary iterations during training. Aligned with
Green AI principles, this approach minimizes resource consumption,
making it suitable for energy-constrained IoT environments.
Model
04 Evaluation
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Evaluation and Deployment

Evaluation
Accuracy
Precision
Recall
F1-score
AUC-ROC
Confusion Matrix
Evaluation and Deployment

Deployment
The IoT threat detection model is containerized with Docker for
portability and deployed on energy-efficient edge devices for real-time
detection with minimal latency. For large-scale applications, we suggest
to use Kubernetes orchestrates cloud deployments to handle high
traffic loads efficiently. Continuous monitoring ensures adaptive
optimization, while secure protocols protect data integrity, enabling a
scalable and robust IoT security framework.
Evaluation and Deployment

Deployment
Comparative Study
Sustainable Green IoT
Security for the Protection:
Subject Internet of
Things Using Sustainability-
Artificial Driven Machine
This Paper Intelligence Intelligence for
ArchitecturesErr
or! Reference Malware
source not Defense [15]
found.
Sustainable Sustainability-driven
Sustainable IoT malware defense for
The focus of the security for IoT
threat detection IoT
Research using LSTM-
using XGBoost
based AI
XGBoost SVM with
(Gradient LSTM (Deep
Model Used Boosting Learning)
Gaussian
Machine) Kernel
Energy-efficient Limited (focus on
Energy explicitly methods like optimized kernel
Efficiency addressed pruning and selection)
quantization
Why XGBOOST
• XGBoost is the best choice for structured tabular data, given its balance of
accuracy, efficiency, and scalability. It performs well on tabular data with
numerical and categorical fields and is easier to optimize for resource-
constrained environments like IoT.

• LSTM would be ideal only if the data has significant temporal dependencies
in the ts field, and computational resources are not a constraint.

• SVM with Gaussian Kernel is less suited for this scenario due to its
scalability challenges and computational inefficiency with large or high-
dimensional datasets.
Summary
Model Performance
Accuracy
99.80%
(%)
Precision
99.58%
(%) 99.80% 99.58% 98.74%
Recall Accuracy Precision
Recall
98.74% (%) (%)
(%) (%)
F1-Score
99.18%
(%)

99.18% 99.99%
F1-Score AUC ROC
(%) Score
THANK YOU

You might also like