Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment

被引:0
|
作者
Alkhonaini, Mimouna Abdullah [1 ]
Alohali, Manal Abdullah [2 ]
Aljebreen, Mohammed [3 ]
Eltahir, Majdy M. [4 ]
Alanazi, Meshari H. [5 ]
Yafoz, Ayman [6 ]
Alsini, Raed [6 ]
Khadidos, Alaa O. [6 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Dept Informat Syst Coll Comp & Informat Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
[4] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[5] Northern Border Univ, Coll Sci, Dept Comp Sci, Ar Ar, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Intrusion detection system; Security; Cyberattacks; Blockchain; Internet of Things; SYSTEM;
D O I
10.1016/j.aej.2024.10.032
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A typical IDS solution can be utilized from the IoT networks for monitoring traffic, device behaviour, and system logs for signs of intrusion or abnormal movement. Deep learning (DL) approaches are exposed to promise in enhancing the accuracy and effectiveness of IDS for IoT devices. Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. The key contribution of the SPOHDL-ID model is to accomplish security via the intrusion detection and classification process from the IoT platform. In this case, the BC technology can be used for a secure data-sharing process. In the presented SPOHDL-ID technique, the selection of features from the network traffic data takes place using the SPO model. Besides, the SPOHDL-ID technique employs the HDL model for intrusion detection, which involves the design of a convolutional neural network with a stacked autoencoder (CNN-SAE) model. The beetle search optimizer algorithm (BSOA) method is used for the hyperparameter tuning procedure to increase the recognition outcomes of the CNN-SAE technique. An extensive simulation outcome is created to exhibit a better solution to the SPOHDL-ID method. The experimental validation of the SPOHDL-ID method portrayed a superior accuracy value of 99.59 % and 99.54 % over recent techniques under the ToN-IoT and CICIDS-2017 datasets.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 50 条
  • [31] Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment
    Alrayes, Fatma S. S.
    Asiri, Mashael M. M.
    Maashi, Mashael
    Salama, Ahmed S. S.
    Hamza, Manar Ahmed
    Ibrahim, Sara Saadeldeen
    Zamani, Abu Sarwar
    Alsaid, Mohamed Ibrahim
    SUSTAINABILITY, 2023, 15 (08)
  • [32] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [33] BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment
    Zhang, Peiying
    Hong, Yanrong
    Kumar, Neeraj
    Alazab, Mamoun
    Alshehri, Mohammad Dahman
    Jiang, Chunxiao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3551 - 3561
  • [34] Artificial Rabbits Optimizer with Deep Learning Model for Blockchain-Assisted Secure Smart Healthcare System
    Khubrani, Mousa Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 935 - 945
  • [35] Intrusion Detection in IoT Using Deep Learning
    Banaamah, Alaa Mohammed
    Ahmad, Iftikhar
    SENSORS, 2022, 22 (21)
  • [36] Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model
    Ahmed, Mohammed Altaf
    Althubiti, Sara A.
    Rao, Dronamraju Nageswara
    Lydia, E. Laxmi
    Cho, Woong
    Joshi, Gyanendra Prasad
    Kim, Sung Won
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 4695 - 4711
  • [37] A hybrid deep learning-based intrusion detection system for IoT networks
    Khan, Noor Wali
    Alshehri, Mohammed S.
    Khan, Muazzam A.
    Almakdi, Sultan
    Moradpoor, Naghmeh
    Alazeb, Abdulwahab
    Ullah, Safi
    Naz, Naila
    Ahmad, Jawad
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (08) : 13491 - 13520
  • [38] Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment
    Alqaralleh B.A.Y.
    Vaiyapuri T.
    Parvathy V.S.
    Gupta D.
    Khanna A.
    Shankar K.
    Personal and Ubiquitous Computing, 2024, 28 (01) : 17 - 27
  • [39] Intrusion Detection in IoT Networks Using Deep Learning Algorithm
    Susilo, Bambang
    Sari, Riri Fitri
    INFORMATION, 2020, 11 (05)
  • [40] Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment
    Marzouk, Radwa
    Alrowais, Fadwa
    Negm, Noha
    Alkhonaini, Mimouna Abdullah
    Hamza, Manar Ahmed
    Rizwanullah, Mohammed
    Yaseen, Ishfaq
    Motwakel, Abdelwahed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3763 - 3775