Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics

被引:0
作者
Alabdan, Rana [1 ]
Alabduallah, Bayan [2 ]
Alruwais, Nuha [3 ]
Arasi, Munya A. [4 ]
Asklany, Somia A. [5 ]
Alghushairy, Omar [6 ]
Alallah, Fouad Shoie [7 ]
Alshareef, Abdulrhman [7 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Coll Appl Studies & Community Serv, Dept Comp Sci & Engn, POB 22459, Riyadh 11495, Saudi Arabia
[4] King Khalid Univ, Coll Sci & Arts RijalAlmaa, Dept Comp Sci, Abha, Saudi Arabia
[5] Northern Border Univ, Fac Sci & Arts, Dept Comp Sci & Informat Technol, Ar Ar 91431, Saudi Arabia
[6] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 21589, Saudi Arabia
[7] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Consumer electronics; Blockchain; Internet of things; Deep learning; Intrusion detection system; Crayfish optimization algorithm;
D O I
10.1016/j.aej.2024.09.117
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Internet of Things (IoTs) revolutionizes the consumer electronics landscape by presenting a degree of personalization and interactivity that was previously unimaginable. Interconnected devices are now familiar with user characteristics, giving custom skills that improve the user's satisfaction. Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. Robust security measures are crucial for maintaining trust in the proliferation and adoption of interconnected technologies, mitigating those risks, protecting sensitive data, and certifying the integrity of the IoT ecosystem. An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. Using machine learning (ML) methods and anomaly detection algorithms, IDS can rapidly identify abnormal activities, unauthorized access, or malicious behaviours within the IoT ecosystem, thus preserving the integrity of interconnected devices and networks, safeguarding sensitive data, and protecting against cyber-attacks. This work presents an Improved Crayfish Optimization Algorithm with Interval Type-2 Fuzzy Deep Learning (ICOA-IT2FDL) technique for Intrusion Detection on IoT infrastructure. The main intention of the ICOA-IT2FDL technique is to utilize a hyperparametertuned improved deep learning (DL) method for intrusion detection, thereby improving safety in the IoT infrastructure. BC technology can be used to accomplish security among consumer electronics. The ICOA-IT2FDL technique employs a linear scaling normalization (LSN) approach for data normalization. In addition, features are selected using an improved crayfish optimization algorithm (ICOA). This is followed by the ICOA-IT2FDL technique, which applies the interval type-2 fuzzy deep belief network (IT2-FDBN) model to identify intrusions. Finally, the bald eagle search (BES) model strategy improves the intrusion recognition rate. A series of investigations is accomplished to ensure the enhanced accomplishment of the ICOA-IT2FDL model. The experimentation results specified that the ICOA-IT2FDL model shows better recognition results compared to recent models.
引用
收藏
页码:153 / 167
页数:15
相关论文
共 22 条
  • [1] Abid Y. A., 2024, IEEE Internet Things J.
  • [2] DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things
    Ahmad, Jawad
    Shah, Syed Aziz
    Latif, Shahid
    Ahmed, Fawad
    Zou, Zhuo
    Pitropakis, Nikolaos
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8112 - 8121
  • [3] An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things
    AL-Hawawreh, Muna
    Sitnikova, Elena
    den Hartog, Frank
    [J]. 3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, : 83 - 87
  • [4] Anushiya R., 2023, Meas.: Sens., V26, DOI DOI 10.1016/J.MEASEN.2023.100700
  • [5] TRUST-based features for detecting the intruders in the Internet of Things network using deep learning
    Bhor, Harsh Namdev
    Kalla, Mukesh
    [J]. COMPUTATIONAL INTELLIGENCE, 2022, 38 (02) : 438 - 462
  • [6] Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering
    Derhab, Abdelouahid
    Aldweesh, Arwa
    Emam, Ahmed Z.
    Khan, Farrukh Aslam
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [7] An improved anomaly detection model for IoT security using decision tree and gradient boosting
    Douiba, Maryam
    Benkirane, Said
    Guezzaz, Azidine
    Azrour, Mourade
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (03) : 3392 - 3411
  • [8] Integrating renewable energy and V2G uncertainty into optimal power flow: A gradient bald eagle search optimization algorithm with local escaping operator
    Hassan, Mohamed H.
    Kamel, Salah
    Dominguez-Garcia, Jose Luis
    Molu, Reagan Jean Jacques
    [J]. IET RENEWABLE POWER GENERATION, 2024, 18 (16) : 4119 - 4152
  • [9] lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
    Hazman, Chaimae
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 4069 - 4083
  • [10] Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment
    Jayasankar, T.
    Buri, R. Kiruba
    Maheswaravenkatesh, P.
    [J]. JOURNAL OF FORECASTING, 2024, 43 (02) : 415 - 428