Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment

被引:0
|
作者
Alkhonaini, Mimouna Abdullah [1 ]
Alohali, Manal Abdullah [2 ]
Aljebreen, Mohammed [3 ]
Eltahir, Majdy M. [4 ]
Alanazi, Meshari H. [5 ]
Yafoz, Ayman [6 ]
Alsini, Raed [6 ]
Khadidos, Alaa O. [6 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Dept Informat Syst Coll Comp & Informat Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
[4] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[5] Northern Border Univ, Coll Sci, Dept Comp Sci, Ar Ar, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Intrusion detection system; Security; Cyberattacks; Blockchain; Internet of Things; SYSTEM;
D O I
10.1016/j.aej.2024.10.032
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A typical IDS solution can be utilized from the IoT networks for monitoring traffic, device behaviour, and system logs for signs of intrusion or abnormal movement. Deep learning (DL) approaches are exposed to promise in enhancing the accuracy and effectiveness of IDS for IoT devices. Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. The key contribution of the SPOHDL-ID model is to accomplish security via the intrusion detection and classification process from the IoT platform. In this case, the BC technology can be used for a secure data-sharing process. In the presented SPOHDL-ID technique, the selection of features from the network traffic data takes place using the SPO model. Besides, the SPOHDL-ID technique employs the HDL model for intrusion detection, which involves the design of a convolutional neural network with a stacked autoencoder (CNN-SAE) model. The beetle search optimizer algorithm (BSOA) method is used for the hyperparameter tuning procedure to increase the recognition outcomes of the CNN-SAE technique. An extensive simulation outcome is created to exhibit a better solution to the SPOHDL-ID method. The experimental validation of the SPOHDL-ID method portrayed a superior accuracy value of 99.59 % and 99.54 % over recent techniques under the ToN-IoT and CICIDS-2017 datasets.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 50 条
  • [21] Optimized Blockchain-Based Deep Learning Model for Cloud Intrusion Detection
    Alasmari, Sultan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (09) : 914 - 925
  • [22] Deep learning enabled intrusion detection system for Industrial IOT environment
    Nandanwar, Himanshu
    Katarya, Rahul
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [23] Deep Learning in IoT Intrusion Detection
    Stefanos Tsimenidis
    Thomas Lagkas
    Konstantinos Rantos
    Journal of Network and Systems Management, 2022, 30
  • [24] A blockchain-assisted security management framework for collaborative intrusion detection in smart cities
    Li, Wenjuan
    Stidsen, Christian
    Adam, Tobias
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [25] Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model
    Albakri, Ashwag
    Alqahtani, Yahya Muhammed
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [26] RETRACTED: Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs (Retracted Article)
    Sugumaran, V. R.
    Rajaram, A.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (03) : 4261 - 4276
  • [27] Blockchain-assisted caching optimization and data storage methods in edge environment
    Jingjing Guo
    Chunlin Li
    Youlong Luo
    The Journal of Supercomputing, 2022, 78 : 18225 - 18257
  • [28] Federated Deep Learning for Intrusion Detection in IoT Networks
    Belarbi, Othmane
    Spyridopoulos, Theodoros
    Anthi, Eirini
    Mavromatis, Ioannis
    Carnelli, Pietro
    Khan, Aftab
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 237 - 242
  • [29] Blockchain-assisted caching optimization and data storage methods in edge environment
    Guo, Jingjing
    Li, Chunlin
    Luo, Youlong
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (16) : 18225 - 18257
  • [30] Blockchain-assisted healthcare insurance fraud detection framework using ensemble learning
    Kapadiya, Khyati
    Ramoliya, Fenil
    Gohil, Keyaba
    Patel, Usha
    Gupta, Rajesh
    Tanwar, Sudeep
    Rodrigues, Joel J. P. C.
    Alqahtani, Fayez
    Tolba, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122