Malicious traffic segregation using hunger game jellyfish optimisation in IoT-cloud

被引:0
作者
Sonawane, Sunil [1 ]
Gulwani, Reshma [2 ]
Sharma, Pooja [3 ]
机构
[1] DY Patil Univ, Comp Engn, Pune, Maharashtra, India
[2] Dr DY Patils Ramrao Adik Inst Technol, Dept Informat Technol, Sect 7,Phase 1, Navi Mumbai, Maharashtra, India
[3] DY Patil Univ, Sch Engn & Technol, Dept Comp Engn, Pune, Maharashtra, India
关键词
malicious traffic segregation; internet of things; IoT-cloud; Gaussian filter; Pearson correlation; SpinalNet;
D O I
10.1504/IJGUC.2024.142749
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The extensive growth rate in the Internet of Things (IoT) has acquired a huge focus on cybercriminals and the increasing count of cyber-attacks on IoT devices made it a complex process. Here, a new deep learning-assisted model is developed in cloud-IoT for malicious traffic segregation. Firstly, IoT cloud simulation is done and the data is routed to the Base Station (BS). Routing is implemented with Hunger Game Jellyfish Optimisation (HGJO), where the route is determined based on fitness function. Here, the malicious traffic segregation is executed at BS. The log files are supplied to data pre-processing and feature selection is implemented with Pearson correlation. The malicious traffic segregation is implemented using SpinalNet, which is trained using HGJO. The HGJO is produced by combining the Hunger Games Search (HGS) and Jellyfish Search (JS). The HGJO-SpinalNet provided an elevated accuracy of 91.4%, sensitivity of 91.2% and specificity of 92.1%.
引用
收藏
页码:588 / 601
页数:15
相关论文
共 33 条
  • [1] Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
    Ahmed, Sheeraz
    Khan, Zahoor Ali
    Mohsin, Syed Muhammad
    Latif, Shahid
    Aslam, Sheraz
    Mujlid, Hana
    Adil, Muhammad
    Najam, Zeeshan
    [J]. FUTURE INTERNET, 2023, 15 (02)
  • [2] Al-Faiz M. Z., 2018, Iraqi J. Inf. Commun. Technol, V1, P42, DOI [10.31987/ijict.1.3.41, DOI 10.31987/IJICT.1.3.41]
  • [3] Task scheduling in cloud-based survivability applications using swarm optimization in IoT
    Al-Turjman, Fadi
    Hasan, Mohammed Zaki
    Al-Rizzo, Hussain
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (08)
  • [4] XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning
    Alani, Mohammed M. M.
    Damiani, Ernesto
    [J]. SENSORS, 2023, 23 (11)
  • [5] Novel Reliable and Energy-Efficient Routing Protocols for Wireless Sensor Networks
    Almazaideh, Mohammed
    Levendovszky, Janos
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2020, 9 (01)
  • [6] A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
    Awajan, Albara
    [J]. COMPUTERS, 2023, 12 (02)
  • [7] Multiconstrained and multipath QoS aware routing protocol for MANETs
    Balachandra, Mamatha
    Prema, K. V.
    Makkithaya, Krishnamoorthy
    [J]. WIRELESS NETWORKS, 2014, 20 (08) : 2395 - 2408
  • [8] Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381
  • [9] BoT-IoT dataset, 2023, BoT-IoT dataset will be taken
  • [10] Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network
    Chen, Zuo
    He, Min
    Liang, Wei
    Chen, Kai
    [J]. JOURNAL OF SENSORS, 2015, 2015