Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning

被引:0
作者
Shali, A. [1 ]
Chinnasamy, A. [1 ]
Selvakumari, P. [2 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Comp Sci & Engn, Chennai 600044, Tamil Nadu, India
[2] Chennai Inst Technol, Comp Sci & Engn, Chennai, Tamil Nadu, India
来源
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES | 2024年 / 35卷 / 07期
关键词
DETECTION SYSTEM; MODEL;
D O I
10.1002/ett.5018
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Background of the StudyInternet of things (IoT) industry has accelerated its development with the support of advanced information technology and economic expansion. A complete industrial foundation includes software, chips, electronic components, IoT services, integrated systems, machinery, and telecom operators, which the gradual improvement in the IoT industry system has formulated. As the exponential growth of IoT devices increases, the attack surface available to cybercriminals enables them to carry out potentially more damaging operations. As a result, the security sector has witnessed a rise in cyberattacks. Hackers use several methods to copy and modify the information in the IoT environment. Machine learning techniques are used by the intrusion detection (ID) model to determine and categorize attacks in IoT networks.ObjectivesThus, this study explores the ID system with the heuristic-assisted deep learning approaches for effectively detect the attacks in the IoT. At first, the IoT data are garnered in benchmark resources. Then, the gathered data is preprocessed to perform data cleaning. Next, the data is transformed and fed to the feature extraction stage. The feature extraction is performed with the help of one-dimensional convolutional neural network (1D-CNN), where the features are extracted from the target-based pooling layer. Then, these attained deep features are fed to the ID phase, where the cascaded ensemble learning (CEL) approach is adopted for detecting the intrusions. Here, the hyperparameter tuning is done with a new suggested improved darts game optimizer (IDGO) algorithm. Here, the main objective of the developed algorithm helps to maximize accuracy in ID.FindingsThroughout the experimental findings, the developed model provides 86% of accuracy. Thus, the finding of the developed model shows less detecting time and higher detection efficiency. Delivering a consistent and reliable cyber security strategy for IoT networks is complicated by using many IoT protocols. Due to several flaws in IoT protocols, adversaries can attack and hack network information. Threats in any situation include device disruption, data theft, and interruption. Proactive protection technology is now very helpful in improving the security of critical systems due to the development of malicious threats against critical infrastructure. The ID system is more popular as reactive network security. To preserve the network's security, the network ID analyzes the various network data through different behavioral evaluations of the network. Typically, the key components of commercial security products are signatures, thresholds, statistics, or heuristic-driven methods. On IoT networks, many critical vulnerabilities are there, which could be very dangerous. Many cyberattacks increase the sophistication, complexity, confidentiality, availability, and data integrity. The other disadvantage is it does not detect the source of the attack. Early detection of cyberattacks is used to decrease illegal activity in the network system, and also it prevents the risk of intruders during communication. To overcome these issues, the researchers develop an ID model. The architectural representation of the implemented ID model is given in the figure. image
引用
收藏
页数:36
相关论文
共 42 条
  • [1] On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things
    Abdelmoumin, Ghada
    Rawat, Danda B.
    Rahman, Abdul
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4280 - 4290
  • [2] Machine learning approaches to IoT security: A systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    [J]. INTERNET OF THINGS, 2021, 14
  • [3] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [4] An Adaptive Tunicate Swarm Algorithm for Optimization of Shallow Foundation
    Arabali, Amirbahador
    Khajehzadeh, Mohammad
    Keawsawasvong, Suraparb
    Mohammed, Adil Hussein
    Khan, Baseem
    [J]. IEEE ACCESS, 2022, 10 : 39204 - 39219
  • [5] Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model
    Chen, Peng
    Liu, Hongyun
    Xin, Ruyue
    Carval, Thierry
    Zhao, Jiale
    Xia, Yunni
    Zhao, Zhiming
    [J]. COMPUTER JOURNAL, 2022, 65 (11) : 2909 - 2925
  • [6] Chen S., 2019, ISA Trans, V48, P28
  • [7] DiazGomez A., 2005, Analysis of an offline intrusion detection system: a case study in multiobjective genetic algorithms. Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference
  • [8] Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
    Ferrag, Mohamed Amine
    Friha, Othmane
    Maglaras, Leandros
    Janicke, Helge
    Shu, Lei
    [J]. IEEE ACCESS, 2021, 9 : 138509 - 138542
  • [9] FELIDS: Federated learning-based intrusion detection system for Internet of
    Friha, Othmane
    Ferrag, Mohamed Amine
    Shu, Lei
    Maglaras, Leandros
    Choo, Kim-Kwang Raymond
    Nafaa, Mehdi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 165 : 17 - 31
  • [10] Injection attack detection using machine learning for smart IoT applications
    Gaber, Tarek
    El-Ghamry, Amir
    Hassanien, Aboul Ella
    [J]. PHYSICAL COMMUNICATION, 2022, 52