Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics

被引:0
作者
Alabdan, Rana [1 ]
Alabduallah, Bayan [2 ]
Alruwais, Nuha [3 ]
Arasi, Munya A. [4 ]
Asklany, Somia A. [5 ]
Alghushairy, Omar [6 ]
Alallah, Fouad Shoie [7 ]
Alshareef, Abdulrhman [7 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Majmaah 11952, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Coll Appl Studies & Community Serv, Dept Comp Sci & Engn, POB 22459, Riyadh 11495, Saudi Arabia
[4] King Khalid Univ, Coll Sci & Arts RijalAlmaa, Dept Comp Sci, Abha, Saudi Arabia
[5] Northern Border Univ, Fac Sci & Arts, Dept Comp Sci & Informat Technol, Ar Ar 91431, Saudi Arabia
[6] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 21589, Saudi Arabia
[7] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Consumer electronics; Blockchain; Internet of things; Deep learning; Intrusion detection system; Crayfish optimization algorithm;
D O I
10.1016/j.aej.2024.09.117
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Internet of Things (IoTs) revolutionizes the consumer electronics landscape by presenting a degree of personalization and interactivity that was previously unimaginable. Interconnected devices are now familiar with user characteristics, giving custom skills that improve the user's satisfaction. Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. Robust security measures are crucial for maintaining trust in the proliferation and adoption of interconnected technologies, mitigating those risks, protecting sensitive data, and certifying the integrity of the IoT ecosystem. An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. Using machine learning (ML) methods and anomaly detection algorithms, IDS can rapidly identify abnormal activities, unauthorized access, or malicious behaviours within the IoT ecosystem, thus preserving the integrity of interconnected devices and networks, safeguarding sensitive data, and protecting against cyber-attacks. This work presents an Improved Crayfish Optimization Algorithm with Interval Type-2 Fuzzy Deep Learning (ICOA-IT2FDL) technique for Intrusion Detection on IoT infrastructure. The main intention of the ICOA-IT2FDL technique is to utilize a hyperparametertuned improved deep learning (DL) method for intrusion detection, thereby improving safety in the IoT infrastructure. BC technology can be used to accomplish security among consumer electronics. The ICOA-IT2FDL technique employs a linear scaling normalization (LSN) approach for data normalization. In addition, features are selected using an improved crayfish optimization algorithm (ICOA). This is followed by the ICOA-IT2FDL technique, which applies the interval type-2 fuzzy deep belief network (IT2-FDBN) model to identify intrusions. Finally, the bald eagle search (BES) model strategy improves the intrusion recognition rate. A series of investigations is accomplished to ensure the enhanced accomplishment of the ICOA-IT2FDL model. The experimentation results specified that the ICOA-IT2FDL model shows better recognition results compared to recent models.
引用
收藏
页码:153 / 167
页数:15
相关论文
共 22 条
  • [11] Classification framework for faulty-software using enhanced exploratory whale optimizer-based feature selection scheme and random forest ensemble learning
    Mafarja, Majdi
    Thaher, Thaer
    Al-Betar, Mohammed Azmi
    Too, Jingwei
    Awadallah, Mohammed A.
    Abu Doush, Iyad
    Turabieh, Hamza
    [J]. APPLIED INTELLIGENCE, 2023, 53 (15) : 18715 - 18757
  • [12] Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning
    Maghrabi, Louai A.
    Shabanah, Sahar
    Althaqafi, Turki
    Alsalman, Dheyaaldin
    Algarni, Sultan
    Al-Ghamdi, Abdullah Al-Malaise
    Ragab, Mahmoud
    [J]. IEEE ACCESS, 2024, 12 : 8337 - 8345
  • [13] An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
    Mohy-eddine, Mouaad
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 23615 - 23633
  • [14] Potnurwar A. V., 2023, International Journal of Intelligent Systems and Applications in Engineering, V11, P23
  • [15] An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms
    Salman, Emad Hmood
    Taher, Montadar Abas
    Hammadi, Yousif I.
    Mahmood, Omar Abdulkareem
    Muthanna, Ammar
    Koucheryavy, Andrey
    [J]. SENSORS, 2023, 23 (01)
  • [16] A novel deep belief network architecture with interval type-2 fuzzy set based uncertain parameters towards enhanced learning
    Shukla, Amit K.
    Muhuri, Pranab K.
    [J]. FUZZY SETS AND SYSTEMS, 2024, 477
  • [17] Deep learning-based intrusion detection approach for securing industrial Internet of Things
    Soliman, Sahar
    Oudah, Wed
    Aljuhani, Ahamed
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 81 : 371 - 383
  • [18] Consumer-Centric Internet of Medical Things for Cyborg Applications Based on Federated Reinforcement Learning
    Tiwari, Prayag
    Lakhan, Abdullah
    Jhaveri, Rutvij H.
    Gronli, Tor-Morten
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (04) : 756 - 764
  • [19] unsw, About us
  • [20] Soil Salinity Inversion in Yellow River Delta by Regularized Extreme Learning Machine Based on ICOA
    Wang, Jiajie
    Wang, Xiaopeng
    Zhang, Jiahua
    Shang, Xiaodi
    Chen, Yuyi
    Feng, Yiping
    Tian, Bingbing
    [J]. REMOTE SENSING, 2024, 16 (09)